WODEM: Wormhole attack defense mechanism in wireless sensor networks

被引:0
|
作者
Yun, Ji-Hoon [1 ]
Kim, Il-Hwan [1 ]
Lim, Jae-Han [2 ]
Seo, Seung-Woo [1 ]
机构
[1] Seoul Natl Univ, EECS, Seoul, South Korea
[2] ETRI, Daejeon, South Korea
来源
关键词
sensor network; security; wormhole attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The wormhole attack, which is accomplished by selectively relaying packets between two adversaries, can ruin routing and communication of the network without compromising any legitimate nodes. There have been a few countermeasures against the wormhole attack in generic ad hoc networks, but they are not appropriate for sensor networks since they require special devices (e.g. directional antenna) or put much overhead on each node. In this paper, we propose a new countermeasure against the wormhole attack for sensor networks, named WODEM. In WODEM, a few detector nodes equipped with location-aware devices and longer-lasting batteries detect wormholes, and normal sensor nodes are only required to forward control packets from the detector nodes. Therefore, WODEM is efficient in cost and energy. From the simulation results, we show that 10 detector nodes can detect a wormhole within the accuracy of 90% in a densely deployed sensor network.
引用
收藏
页码:200 / +
页数:2
相关论文
共 50 条
  • [21] Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks
    Aliady, Wateen A.
    Al-Ahmadi, Saad A.
    IEEE ACCESS, 2019, 7 : 84132 - 84141
  • [22] An Intelligent Defense Mechanism for Security in Wireless Sensor Networks
    Kumar, E. Sandeep
    Kusuma, S. M.
    Kumar, B. P. Vijaya
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [23] Adaptive Active Defense Mechanism in Wireless Sensor Networks
    Hu, Yu
    Li, Rong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 8 - 13
  • [24] Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks
    Chen, Honglong
    Lou, Wei
    Wang, Zhi
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2009, 5585 : 296 - +
  • [25] A New Localization Scheme with Statistical Estimation against Wormhole Attack in Wireless Sensor Networks
    Niu Yanchao
    Gao Deyun
    Chen Ping
    Zhang Sidong
    Zhang Hongke
    CHINA COMMUNICATIONS, 2010, 7 (05) : 57 - 69
  • [26] A Mitigation Technique for High Transmission Power based Wormhole Attack in Wireless Sensor Networks
    Sharma, Mayank Kumar
    Joshi, Brijendra Kumar
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [27] The Design of a Defense Mechanism to Mitigate Sinkhole Attack in Software Defined Wireless Sensor Cognitive Radio Networks
    Lanka Chris Sejaphala
    Mthulisi Velempini
    Wireless Personal Communications, 2020, 113 : 977 - 993
  • [28] The Design of a Defense Mechanism to Mitigate Sinkhole Attack in Software Defined Wireless Sensor Cognitive Radio Networks
    Sejaphala, Lanka Chris
    Velempini, Mthulisi
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (02) : 977 - 993
  • [29] Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey
    Fang, Weidong
    Zhang, Wuxiong
    Chen, Wei
    Pan, Tao
    Ni, Yepeng
    Yang, Yinxuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [30] TrueLink: A practical countermeasure to the wormhole attack in wireless networks
    Riksson, Jakob
    Krishnamurthy, Srikanth V.
    Faloutsos, Michalis
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, 2006, : 74 - +