IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 08, 2015 | ISSN (online): 2321-0613
Detection Methods for Wormhole Attack in WSN Dhaval N. Tandel1 Bhavin I. Shah2 1,2 Department of Computer Engineering 1,2 SVM Institute of Technology Bharuch 392-001, Gujarat, India Abstract— Wireless communication technique has become an important tool in any application that requires communication between one or more senders and multiple receivers. Security is becoming a major concern for this wireless communication. Wireless sensor networks consist of a large number of small sensor nodes that constantly monitors environmental conditions but due to the partial resources of the nodes and hostile & pervasive environments. so this kind of nature of wireless sensor networks make them very attractive to attacks at all network layers; however, the so-called “wormhole attack”. In wormhole an attacker receives packets at one point in the network, “tunnels” them to another point in the network, and then replays them into the network from that point. In this paper, we will study wormhole attack and some of the methods for detecting of wormhole attack. Key words: Wormhole Attack, WSN, Security, Localization, Authentication I. INTRODUCTION Wireless sensor network is low cost, easily and remotely developed network. In wireless sensor network there are thousands of sensor nodes collaborate with each other and transmit message and create successful communication. WSN has infrastructure less architecture and WSN not require any pre existing architecture for communication. Because this kind of characteristics WSN is used in many applications such as battlefield, surveillance, traffic monitoring, healthcare and environment monitoring etc. Wireless sensor network hostile and open nature network so security is major concern in this network. WSN has many benefits but with some limitation such as limited computation resources, smaller memory capacity, limited battery life processing power & lack of tamper resistant packaging and open nature make WSN more Vulnerable against various types of external and internal attacks [1][2]. II. DIFFERENT ATTACKS ON WSN Here we introduce some attack that harm to group communication over wireless network and that categorize network layer wise [2]. Layer Attacks Denial of Service Physical Layer Tampering Jamming Data Link Layer Collision Traffic manipulation Sybil attack Sinkhole Network Layer Flooding Wormhole attack Resynchronization Transport Layer Packet injection attack Aggregation based attacks Application Layer Attacks on reliability
Table 1: Layer & Attacks Here we introduce some network layer attacks A. Sybil Attack: In Sybil attack one malicious node present itself with multiple spoofed identities with multiple MAC addresses and network address. That malicious node impersonates other nodes identity. Attacker or malicious node harm protocol layer with its fake identities attacker dropped or modify other selective packet [3]. B. Sinkhole Attack: Sinkhole attack is disrupts base station from obtaining the correct and complete routing data from the neighbor node. In sinkhole attack attacker or malicious node tries to attract all or more traffic as possible as with advertising higher trust values and shortest distant values. Sinkhole attack triggering other type of attack like eavesdropping attack, selective forwarding attack, black hole attack, wormhole attack and also change the base station position [3]. C. Flooding Attack: Flooding attack is one kind of denial of service attack. In this attack malicious node send large number of packet or large number of request packet at the one point with the intention to stop services and disrupts communication and cause exhaustion of resources on victim point [3]. D. Wormhole Attack: In the wormhole attack one malicious node receive packets at one location in the network and tunnel them to another location where tunnel end here transferred packets pretend to destination node that they comes from neighbor source node but originally their source node is so far from the destination node [3]. E. Denial of Service Attack: In denial of service attack attacker main intension is exhaust the resource of victim node and makes service unavailable from its user. In this attack attacker send unnecessary extra packets to victim node and also sending thousands of request packets attacker confused the victim system and make service unavailable to its authorized user [5]. In this paper we introduce wormhole attack in detail and its prevention methods F. Wormhole Attack: Wormhole attack is one type of denial of service attack [4]. Which was effective on network layer this attack commonly launched by one or a pairs of collaborating nodes [4]. In a wormhole attack, an attacker receives packets at one point in the network, '''tunnels'' them to another point in the network via an out-of-band connection and replays them at another location in the network [22]. This attack confused and disrupted routing mechanism when routing control mechanism tunneled [2]. The tunnel created between two
All rights reserved by www.ijsrd.com
799