Browse > Article
http://dx.doi.org/10.3745/JIPS.2010.6.2.177

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)  

Sharif, Lukman (London College of Research)
Ahmed, Munir (College of Computer Science and Engineering, Taibah University)
Publication Information
Journal of Information Processing Systems / v.6, no.2, 2010 , pp. 177-184 More about this Journal
Abstract
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.
Keywords
Secure Routing; Routing Attacks; Routing Protocols; Wireless Sensor Networks (WSN); Wormhole Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Zhou, Y., Fang, Y. & Zhang, Y. (2008). Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials. Vol:10, Issue 3, (p 6-28)   DOI
2 Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: a survey. Security in Distributed, Grid and Pervasive Computing. (p 3-5, 10-15)
3 Santi, P. (2005). Topology control in wireless ad hoc and sensor networks. Chichester, England: John Wiley & Sons
4 Hanapi, Z. M., Ismail, M., Jumari, K., & Mirvaziri, H. (2008). Analysis of routing attacks in wireless sensor network. In Proceedings of International Cryptology Workshop and Conference (Cryptology2008). (p 202-214). ISBN 978-983-4069
5 Khalil, I., Bagchi, S., & Shroff, N. B. (2007). Liteworp: detection and isolation of the wormhole attack in static multi-hop wireless networks. Computer Networks. Vol 51(15)
6 Hu, Y. C., Perrig, A. & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In IEEE Infocom
7 Law, Y. W., & Havinga, P. (2005). How to secure a wireless sensor network. (p 89-95)
8 Wood, A. & Stankovic, J. (2002). Denial of service in sensor networks. In Computer. Vol 35, (p 54 - 62)   DOI   ScienceOn
9 Znaidi, W., Minier, M., & Babau, J. P. (2008). An ontology for attacks in wireless sensor networks. Institut National De Recherche En Informatique Et En Automatique
10 Bojkovic,. Z. S., Bakmaz,. B. M,. & Bakmaz,. M. R. (2008). Security issues in wireless sensor networks. International Journal of Communications: Issue 1, Volume 2
11 Raj,. P. N. & Swadas,. P. B,. (2009). DPRAODV: A dynamic learning system against blackhole attack in AODV based MANET. International Journal of Computer Science Issues (IJCSI): Vol.2
12 Venkatraman, L., Agrawal, D. P. (2003). Strategies for enhancing routing security in protocols for mobile ad hoc networks. In Journal for Parallel Distributed Computing. 63 (p 214-227)   DOI   ScienceOn
13 Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of Next-Generation Networks (IJNGN)
14 Kaissi, R. E., Kayssi, A., Chehab, A., & Dawy, Z. (2005). DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks. The Second International Conference on Innovations in Information Technology (IIT’05). American University of Beirut. Beirut, Lebanon.
15 Karlof, C., & Wagner,. D. (2005). Summary of “secure routing in wireless sensor networks: attacks and countermeasures”. In Seminar on Theoretical Computer Science
16 Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis & defenses. In Proceedings of Third International Symposium on Information Processing in Sensor Networks. (p259-268). (ACM 1-58113-846-6)   DOI
17 Jen, S. M., Laih,. C.S., and KuoW,. C. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. In Sensors
18 Kumar, H., Sarma, D., & Kar, K. (2006). Security threats in wireless sensor networks. IEEE   DOI
19 Rehana, J. (2009). Security of wireless sensor network. Seminar on Internetworking (TKK T-110.5190). Helsinki University of Technology
20 Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS): Vol.4, No.1 & 2
21 Hanapi,. Z.M. Ismail,. M,. Jumari,. K. & Mahdavi,. M. (2009). Dynamic window secured implicit geographic forwarding routing for wireless sensor network. World Academy of Science, Engineering and Technology
22 Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks, IEEE Communications Magazine (p 70-75)   DOI   ScienceOn
23 Karlof, C., & Wagner,. D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks Journal: Special Issue on Sensor Network Applications and Protocols. Vol.1, (p293-315), Elsevier Publications   DOI   ScienceOn
24 Naeem,. T & Loo,. K. K. (2009). Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks. International Journal of Digital Content Technology and its Applications: Volume 3, Number 1. (p 89-90)
25 Lee , J. C., Leung, V. C. M., Wong, K. H., Cao, J., & Chan, H. C. B. (2007). Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wireless Communications, (p76-84)   DOI   ScienceOn
26 Kavitha, T., & Sridharan, D. (2010). Security vulnerabilities in wireless sensor networks: a survey. Journal of Information Assurance and Security 5, (p31-44)