WAPN: a distributed wormhole attack detection approach for wireless sensor networks. (English) Zbl 1186.68044

Summary: As the applications of wireless sensor networks (WSNs) diversify, providing secure communication is emerging as a critical requirement. In this paper, we investigate the detection of wormhole attack, a serious security issue for WSNs. Wormhole attack is difficult to detect and prevent, as it can work without compromising sensor nodes or breaching the encryption key. We present a wormhole attack detection approach based on the probability distribution of the neighboring-node-number, WAPN, which helps the sensor nodes to judge distributively whether a wormhole attack is taking place and whether they are in the influencing area of the attack. WAPN can be easily implemented in resource-constrained WSNs without any additional requirements, such as node localization, tight synchronization, or directional antennas. WAPN uses the neighboring-node-number as the judging criterion, since a wormhole usually results in a significant increase of the neighboring-node-number due to the extra attacking link. Firstly, we model the distribution of the neighboring-node-number in the form of a Bernoulli distribution. Then the model is simplified to meet the sensor nodes’ constraints in computing and memory capacity. Finally, we propose a simple method to obtain the threshold number, which is used to detect the existence of a wormhole. Simulation results show that WAPN is effective under the conditions of different network topologies and wormhole parameters.


68M14 Distributed systems


Full Text: DOI


[1] Aboelaze, M., Aloul, F., 2005. Current and Future Trends in Sensor Networks: A Survey. Proc. Int. Conf. on Wireless and Optical Communications Networks, Dubai, United Arab Emirates, p.551-555. [doi:10.1109/WOCN.2005.1436087]
[2] Akyildiz, I. F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E., Wireless sensor networks: a survey, Computer Networks, 38, 393-422, (2002)
[3] Boudriga, N.; Obaidat, M. S., Mobility, sensing, and security management in wireless ad hoc sensor systems, Comput. Electr. Eng., 32, 266-276, (2006) · Zbl 1101.68317
[4] Buttyan, L.; Dora, L.; Vajda, I., Statistical wormhole detection in sensor networks, LNCS, 3813, 128-141, (2005)
[5] Chong, C. Y.; Kumar, S. P., Sensor networks: evolution, opportunities, and challenges, Proc. IEEE, 91, 1247-1265, (2003)
[6] Doyle, B.; Bell, S.; Smeaton, A. F.; McCusker, K.; O’Connor, N. E., Security considerations and key negotiation techniques for power constrained sensor networks, Comput. J., 49, 443-453, (2006)
[7] Faza, A.Z., Sedigh, S., 2006. A General Purpose Framework for Wireless Sensor Network Applications. Proc. 30th Annual Int. Computer Software and Applications Conf., Chicago, USA, p.356-358. [doi:10.1109/COMPSAC.2006.97]
[8] Gura, N.; Patel, A.; Wander, A.; Eberle, H.; Chang Shantz, S., Comparing elliptic curve cryptography and RSA on 8-bit cpus, LNCS, 3156, 925-943, (2004) · Zbl 1104.68476
[9] Hu, L., Evans, D., 2004. Using Directional Antennas to Prevent Wormhole Attacks. Proc. 11th Network and Distributed System Security Symp., San Diego, USA, p.22-32.
[10] Hu, Y. C.; Perrig, A.; Johnson, D. B., Packet leashes: A defense against wormhole attacks in wireless ad hoc networks, Proc. IEEE INFOCOM, San Francisco, CA, USA, 3, 1976-1986, (2003)
[11] Karlof, C.; Wagner, D., Secure routing in wireless sensor networks: attacks and countermeasures, Ad Hoc Networks, 1, 293-315, (2003)
[12] Lee, S.J., Gerla, M., 2001. Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks. Proc. IEEE Int. Conf. on Communications, Helsinki, Finland, p.3201-3205. [doi:10.1109/ICC.2001.937262]
[13] Poovendran, R.; Lazos, L., A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, Wireless Networks, 13, 27-59, (2007)
[14] Qi, H.; Iyengar, S. S.; Chakrabarty, K., Distributed sensor networks a review of recent research, J. Franklin Inst., 338, 655-668, (2001) · Zbl 1169.93314
[15] Qian, L. J.; Song, N.; Li, X. F., Detection of wormhole attacks in multipath routed wireless ad hoc networks: a statistical analysis approach, J. Network Comput. Appl., 30, 308-330, (2007)
[16] Roman, R.; Zhou, J.; Lopez, J., On the security of wireless sensor networks, LNCS, 3482, 681-690, (2005)
[17] Shi, E.; Perrig, A., Designing secure sensor networks, IEEE Wirel. Commun., 11, 38-43, (2004)
[18] Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B., 2002. On Communication Security in Wireless Ad-hoc Sensor Networks. Proc. 11th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, p.139-144. [doi:10.1109/ENABL.2002.1030000]
[19] Sohrabi, K.; Gao, J.; Ailawadhi, V.; Pottie, G. J., Protocols for self-organization of a wireless sensor network, IEEE Pers. Commun., 7, 16-27, (2000)
[20] Wang, W.C., Bhargava, B., 2004. Visualization of Wormholes in Sensor Networks. Proc. ACM Workshop on Wireless Security, Philadelphia, PA, USA, p.51-60.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.