itcse_paper4

Upload: gurudatt-kulkarni

Post on 04-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 ITCSE_paper4

    1/4

    IRNet Transactions on Computer Science and Engineering

    21

    Detection of Wormhole Attack in Wireless Sensor Networks

    Kuldeep Kaur, Vinod Kumar & Upinderpal Singh

    Department of Computer Science & Engineering, Lovely Professional University Punjab, India

    E-mail : [email protected], [email protected] & upinder.singh418 @gmail.com

    Abstract - The wireless sensor network is the collection of sensor nodes which collect information from the environment, theenvironment may be the building, industrial, battle field or elsewhere. Due to the wireless nature of the sensor nodes they are prone

    to various attacks like wormhole attack, grayhole, packet flooding, sinkhole attack, blackhole attack, sync attack, Sybil attack. In this

    paper I proposed the solution to detect the wormhole attack. In this solution I use the concept of digital signature in the packet

    header information .Using this solution the sensor nodes can be authenticate and can avoid the wormhole attack as possible in

    wireless sensor networks.

    Keywords - Hello, Sensor.

    I. INTRODUCTION

    A Wireless Sensor Network [1] is a self-configuring

    network of small sensor nodes communicating among

    themselves using radio signals, and deployed in quantity

    to sense, monitor and understand the physical world.

    The wireless sensor nodes are called motes. A huge

    number of these devices configure the network and

    these motes have following capabilities: -

    1) Computational capabilities.2) Sensing capabilities.3) Communication capabilities.As we know that wireless sensor network

    technology is a technology in which sensor works under

    the rigorous conditions where human cannot survive for

    long. The major challenge in the field of wireless sensor

    technology is the energy consumption along with good

    bandwidth. This issue requires innovative design

    techniques to use the available bandwidth and energy

    efficiency.

    II. ARCHITECTURE FOR NODES INWIRELESS SENSOR NETWORKS

    The nodes have to meet the requirement of a

    specific application. They should be small cheap,

    portable and energy efficient. The basic components of anode are:

    1) Sensor and actuator - An interface to the physicalworld designed to sense the environmental

    parameters like pressure and temperature.

    2) Controller It is used to control different modes ofoperation for processing of data.

    3) Memory - Storage for programming data.4) Communication - A device like antenna for

    sending and receiving data over a wireless channel.

    5) Power Supply- Supply of energy for smoothoperation of a node like battery[2].

    Fig. 1: Architecture of sensor node

    III.ATTACKS IN WIRELESS SENSORNETWORKS

    The open nature of the wireless communication

    channels, the lack of infrastructure, the fast deployment

    practices, and the hostile environments where they may

  • 7/30/2019 ITCSE_paper4

    2/4

    Detection of Wormhole Attack in Wireless Sensor Networks

    IRNet Transactions on Computer Science and Engineering

    22

    be deployed, make them vulnerable to a wide range of

    security attacks. The attacks such as[1]

    1) Spoofed, altered, or replayed routinginformation

    2) Selective forwarding3) Sinkhole attacks4) Sybil attacks5) Wormholes6) HELLO flood attacks

    Spoofed, altered, or replayed routing information

    The most direct attack against a routing protocol is

    to target the routing information exchanged between

    nodes. By spoofing, altering, or replaying routing

    information, adversaries may be able to create routing

    loops, attract or repel network traffic, extend or shortensource routes, generate false error messages, partition

    the network, increase end-to-end latency, etc.[1]

    Selective forwarding

    Multi-hop networks are often based on the

    assumption that participating nodes will faithfully

    forward received messages. In a selective forwarding

    attack, malicious nodes may refuse to forward certain

    messages and simply drop them, ensuring that they are

    not propagated any further. A simple form of this attack

    is when a malicious node behaves like a black hole and

    refuses to forward every packet .[3]

    Sinkhole attacks

    In a sinkhole attack, the adversarys goal is to lure

    nearly all the traffic from a particular area through acompromised node, creating a metaphorical sinkhole

    with the adversary at the centre. Because nodes on, or

    near, the path that packets follow have many

    opportunities to tamper with application data, sinkhole

    attacks can enable many other attacks . Sinkhole attacks

    typically work by making a compromised node look

    especially attractive to surrounding nodes with respect

    to the routing algorithm. [2][3].

    Sybil attack

    In a Sybil attack a single node presents multiple

    identities to other nodes in the network. The Sybil attack

    can significantly reduce the effectiveness of fault-

    tolerant schemes such as distributed storage andmultipath. Replicas, storage partitions, or routes

    believed to be using disjoint nodes could in actuality be

    using a single adversary presenting multiple

    identities.[2]

    HELLO flood attack

    Many protocols require nodes to broadcast HELLO

    packets to announce themselves to their neighbors, and a

    node receiving such a packet may assume that it is

    within radio range of the sender. This assumption may

    be false: a laptop-class attacker broadcasting routing or

    other information with large enough transmission power

    could convince every node in the network that the

    adversary is its neighbor.[3]

    Wormhole Attack

    In the wormhole attack, an attacker tunnels

    messages received in one part of the network over a low

    latency link and replays them in a different part. The

    simplest instance of this attack is a single node situated

    between two other nodes forwarding messages between

    the two of them. However, wormhole attacks more

    commonly involve two distant malicious nodes

    colluding to understate their distance from each other by

    relaying packets along an out-of-bound channel

    available only to the attacker. An attacker situated close

    to a base station may be able to completely disrupt

    routing by creating a well-placed wormhole. An attacker

    could convince nodes who would normally be multiple

    hops from a base station that they are only one or two

    hops away via the wormhole. This can create a sinkhole:

    since the attacker on the other side of the wormhole can

    artificially provide a high-quality route to the base

    station, potentially all traffic in the surrounding area will

    be drawn through if alternate routes are significantly

    less attractive. This will most likely always be the case

    when the endpoint of the wormhole is relatively far from

    a base station[4].

    Fig. 2 : Illustration of wormhole attack in wireless

    network.

  • 7/30/2019 ITCSE_paper4

    3/4

    Detection of Wormhole Attack in Wireless Sensor Networks

    IRNet Transactions on Computer Science and Engineering

    23

    IV. PROPOSED SOLUTIONIn this section I will explain in detail the proposed

    solution node authentication using the digital signature.

    In this algorithm the authentication is provided at each

    sensor node in the packet header which is forward from

    source to destination. Only the authenticate nodes can

    communicate in wireless sensor network. Using this

    authentication procedure we can detect the malicious

    nodes which causes the wormhole attack.

    ALGORITHM

    Source Node

    If (Any Packet sent P)

    {

    Alter Header add columns =Route and =Signatures

    Insert id into Route Column

    Insert Digital Signature into Signature Column

    Forward Packet P

    }

    If (received A Packet)

    {

    If (Received Packet==Data_Ack)

    {

    Note the =Signature in the header

    Note Route Noted In header

    Verify the Digital Signature

    If(Verification Successful)

    {

    Discard the route noted

    Else

    {

    Drop the packet

    }

    Repeat the procedure for next packet

    }

    }

    Intermediate Node

    If (Received a packet P)

    {

    Insert id into Route Column

    Insert Digital Signature into Signature Column

    Forward Packet P

    }

    Destination Node

    If (Received a packet P)

    {

    Note the =Signature in the header

    Note Route Noted In header

    Verify the Digital Signature

    If(Verification Successful)

    Note the =Signature in the header

    Note Route Noted In header

    Verify the Digital SignatureIf(Verification Successful)

    {

    Noted route=Null;

    }

    Else

    {

    Noted Route unchanged

    }

    Create Data_Ack Packet

    Insert columns =Route and =Signatures in

    Data_Ack

    }

    Insert id into Route Column

    Insert Digital Signature into Signature Column

    }

    V. CONCLUSIONSecurity related issues in wireless sensor networks

    have become an important part of research in present

    scenario. To detecting malicious functions of node and

    offering efficient counter measure is the difficult task. Inthe proposed method there is no need for specific

    hardware and neither is the need for clock

    synchronization due to use of cryptographic concept

    digital signature. In that each node authenticate using

    digital signature. The received node at the destination

  • 7/30/2019 ITCSE_paper4

    4/4

    Detection of Wormhole Attack in Wireless Sensor Networks

    IRNet Transactions on Computer Science and Engineering

    24

    node is verified and if the digital signature is false the

    information about that is sent to the sender node using

    DATA_ACK.

    REFERENCES

    [1] Guiyi Wei Xueli Wang Detecting Wormhole

    Attacks Using Probabilistic Routing andRedundancy Transmission. WASE International

    Conference on Information Engineering 2010.PP-

    251-254.

    [2] Junfeng Wu, HonglongChe, Label-Based DV-

    Hop Localization AgainstWormhole Attacksin

    Wireless Sensor Networks.Fifth IEEE

    International Conference on Networking,

    Architecture, and Storage 2010. Pp-79-88.

    [3] Zhibin Zhao, Bo Wei, Xiaomei Dong, Lan Yao,

    FuxiangGaoDetecting Wormhole Attacks in

    Wireless Sensor Networks with Statistical

    AnalysisFirst International Conference on

    Integrated Intelligent Computing.pp-283-289.

    [4] Prasannajit B1, Venkatesh, Anupama S An

    Approach towards Detection of Wormhole Attack

    in Sensor Networks 2010 First International

    Conference on Integrated Intelligent Computing.

    [5] Thorne, Kip S. (1994). Black Holes and Time

    Warps. W. W. Norton. p. 504.ISBN 03-23763.

    [6] DeBenedictis, Andrew and Das, A. (2001). "On a

    General Class of Wormhole

    Geometries". Classical and Quantum

    Gravity 18 (7): 11871204.

    [7] Forman G., Zahorjan J,The challenges of mobile

    computing,IEEE Computer; 27(4):38-47.

    [8] Bayrem Triki, Slim Rekhis, Noureddine

    Boudriga , Digital Investigation of Wormhole

    Attacks in Wireless Sensor Networks, Network

    Computing and Applications, IEEE International

    Symposium, July 2009, pp. 179-186 .

    [9] Dezun Dong, Mo Li, Yunhao Liu, Xiangke

    Liao , Connectivity-Based Wormhole Detection

    in Wireless Ad Hoc and Sensor Networks,

    Parallel and Distributed Systems, International

    Conference on , December 2009, pp. 72-79 .

    [10] B. Prasannajit, Anupama S. Venkatesh, K.

    Vindhykumari, S.R. Subhashini, G. Vinitha , An

    Approach Towards Detection of WormholeAttack in Sensor Networks, Integrated

    Intelligent Computing , August 2010, pp. 283-

    289.