A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks

作者: Majid Meghdadi , Suat Ozdemir , Inan Güler

DOI: 10.4103/0256-4602.78089

关键词: SIMPLE (military communications protocol)Computer scienceNetwork packetWormholeTask (computing)Wireless ad hoc networkSensor nodeWireless sensor networkComputer networkBase station

摘要: AbstractIn wormhole attacks, attackers create a low-latency link between two points in the network. This can be achieved by either compromising or more sensor nodes of network adding new set mali-cious to Once is established, attacker collects data packets on one end link, sends using and replays them at other end. Wormhole attacks result alterations flow thereby deceiving base station. Although implementing attack relatively simple, detecting it not trivial task as replayed information usually valid. paper focuses presents state-of-the-art detection wireless networks. The existing protocols are presented detail and, based research, open research areas future directions provided.

参考文章(68)
B. Awerbuch, R. Curtmola, D. Holmer, H. Rubens, C. Nita-Rotaru, On the Survivability of Routing Protocols in Ad Hoc Wireless Networks international workshop on security. pp. 327- 338 ,(2005) , 10.1109/SECURECOMM.2005.30
David R. Raymond, Scott F. Midkiff, Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses IEEE Pervasive Computing. ,vol. 7, pp. 74- 81 ,(2008) , 10.1109/MPRV.2008.6
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargava, Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks IEEE Transactions on Wireless Communications. ,vol. 8, pp. 736- 745 ,(2009) , 10.1109/TWC.2009.070536
L.M. Ni, P.K. McKinley, A survey of wormhole routing techniques in direct networks IEEE Computer. ,vol. 26, pp. 492- 506 ,(1993) , 10.1109/2.191995
Weichao Wang, Bharat Bhargava, Visualization of wormholes in sensor networks Proceedings of the 2004 ACM workshop on Wireless security - WiSe '04. pp. 51- 60 ,(2004) , 10.1145/1023646.1023657
Radha Poovendran, Loukas Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks Wireless Networks. ,vol. 13, pp. 27- 59 ,(2007) , 10.1007/S11276-006-3723-X
Ning Song, Lijun Qian, Xiangfang Li, Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach international parallel and distributed processing symposium. pp. 289- ,(2005) , 10.1109/IPDPS.2005.471
George C. Dalton <suffix>II</suffix>, Kenneth S. Edge, Robert F. Mills, Richard A. Raines, Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees International Journal of Security and Networks. ,vol. 5, pp. 87- 95 ,(2010) , 10.1504/IJSN.2010.032207
Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos, TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks international conference on network protocols. pp. 75- 84 ,(2006) , 10.1109/ICNP.2006.320200
Yih-Chun Hu, A. Perrig, D.B. Johnson, Wormhole attacks in wireless networks IEEE Journal on Selected Areas in Communications. ,vol. 24, pp. 370- 380 ,(2006) , 10.1109/JSAC.2005.861394