Top Banner
A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks 1 P. Balamurugan, 2 K. Marimuthu and 3 M. Shyamala Devi 1 Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and Technology, Chennai. [email protected] 2 Vellore Institute of Technology, Vellore. 3 Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and Technology, Chennai. Abstract Wireless sensor network which, now a days, is affected with several attack. The attack which is happening in WSN, called as wormhole attack. To deal with wormhole attack this paper uses some requirement which is either it uses specialized hardware or in order to capture a specific pattern extra overhead over the network. This paper explains a reliable and efficient design to detection of wormhole attack and localization based method on the basis of key study. The wormholes attack a large number of network traffic so the goal of this paper is to, detect the wormhole which is attacked the flow of networks, reduce the cost of detection of wormhole attack. Key Words:Wireless sensor networks, attacks, overhead, energy, security, detection and latency. International Journal of Pure and Applied Mathematics Volume 119 No. 15 2018, 1743-1753 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ Special Issue http://www.acadpubl.eu/hub/ 1743
12

A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

Aug 10, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

A Reliable and Efficient Design for Detection of

Wormhole Attack in Wireless Sensor Networks 1P. Balamurugan,

2K. Marimuthu and

3M. Shyamala Devi

1Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and

Technology,

Chennai.

[email protected]

2Vellore Institute of Technology,

Vellore. 3Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and

Technology,

Chennai.

Abstract Wireless sensor network which, now a days, is affected with several

attack. The attack which is happening in WSN, called as wormhole attack.

To deal with wormhole attack this paper uses some requirement which is

either it uses specialized hardware or in order to capture a specific pattern

extra overhead over the network. This paper explains a reliable and

efficient design to detection of wormhole attack and localization based

method on the basis of key study. The wormholes attack a large number of

network traffic so the goal of this paper is to, detect the wormhole which is

attacked the flow of networks, reduce the cost of detection of wormhole

attack.

Key Words:Wireless sensor networks, attacks, overhead, energy, security,

detection and latency.

International Journal of Pure and Applied MathematicsVolume 119 No. 15 2018, 1743-1753ISSN: 1314-3395 (on-line version)url: http://www.acadpubl.eu/hub/Special Issue http://www.acadpubl.eu/hub/

1743

Page 2: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

1. Introduction

WSN, collection of small devices called nodes, is attacked by various attackers,

especially destructive wormhole attack, which completely destroyed the

network topology. WSN has a base station and sensor devices called nodes. In

sensor network field, each node can try to transmit the collected information to

the base station. The definition of WSN is clearly shown in figure 1. Sometime

due to wormhole attack, sensor nodes are misdirected to base station which is

available to few hops ahead. In this case, the data is transmitted through the

attacker node. Due to wormhole attack false data will be passed to base station

instead of important data. Each node communicates false statements, which is

sent by attacker node. The attacker node which leads to unauthorized access to

the important data.

Fig. 1: Wireless Sensor Network

Wormhole attack in WSN: Sensor node identification privacy, sensor node

location privacy, route privacy and data packet privacy are used as some

privacy primitives in wsn for secure communication. These primitives which

has to secure the data they have. Attacker can collect the security information

which is

Security Requirements in WSN

Computer security involves in some factors to secure data such as prevention,

detection and survivability of attacks. Commonly wsn nodes are deployed in

unattended environments to focus on the survivability of attacks. Several

properties may be considered to a secure protocol, depending the specific

application. In this paper some of security requirements are defined here.

1. Confidentiality which prevents unauthorized access in process of

communication.

2. Integrity which is defined as the prevention of unauthorized, either

accidental or malicious, modification or destruction of information

International Journal of Pure and Applied Mathematics Special Issue

1744

Page 3: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

would result in deceiving the authorized entity by providing with false

information.

3. Authentication is the process of verifying an object’s or entity’s claimed

identity in Communication process.

4. Availability: in sensor network, it refers how much time a system is

functioning to the user, which means that collecting data from the

sensors. It is not directly considered as security requirements but may be

considered as an adversary can mount different attacks to interfere with

the normal functioning of the sensor network.

5. Data freshness: while message exchange between nodes, they should

obey in a message ordinary or have not be reused the old authentic

message.

2. Related Work

There are many existing solution in WSN for detection of wormhole attacks and

the misbehaving node. In these solutions, many existing protocol uses a

specified hardware to provide selection for detection of wormhole attack. Due

to use of this specified hardware, it requires extra processing of data, additional

cost and based on this nodes consume more energy.

In this part, this paper discuss with some of the solutions available for detecting

of wormhole attack. The proposed methods in [1] are to detect the wormhole

attack using geographical and temporal packet leaches. GPS and time

synchronization are not supported in this work. The paper [2], which reserves a

some of the sensor nodes for global positioning locators and directional

antennas. This paper also uses broadcasting of keys to transmit the data to the

other node. The paper [3] has developed a transmission based route setup which

uses to identify the attacks by observing the transmission time among the sensor

nodes. The method, developed by Krawczyk, which helps to reduce the cost of

the detection of wormhole attack in WSN.

The paper [4] has developed a graph based mechanism for the identification and

detection of wormhole attacks, which supports proactive protocols but it fails

when UDG model is not supported by the connectivity graphs. A few of

methods have discussed with traffic flow analysis using statistical analysis and

anomaly based detection scheme. L. Buttyan et.[5], who has developed a

mechanism, which is based on statistical analysis method to find multipath

routing. It helps to integrate this method with intrusion detection system. The

drawback of the protocol is it will be working with on-demand protocol.

3. Problem Formulation

This paper clearly finds the wormhole attack problems in figure 2. In figure1,

Node P wants to send data to node Q so it sends request message to node Q

through nodes r, s and t. now node Q broadcast the reply request to node P but

node r receives the reply request sent by node Q and node r replies reply request

International Journal of Pure and Applied Mathematics Special Issue

1745

Page 4: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

to its neighbor node u and P. in this case, the malicious nodes may be hidden in

the network. These nodes can form new link called fast link with help of nodes

s, t and P. Hence the node t broadcasts the reply request message to the node Q.

in this case, node P wants to transmit the data to node Q but it chooses the

alternative path instead of original path which is PrstQ. so it can

choose shortest path, which is created by malicious nodes, which is

Pm1m2Q.

The malicious route results in term of delay and packet drop in the networks. So

malicious nodes can modify the packet while communicate the information

between source to destination.

Fig. 2: Definition of Walmhole Attack

Objective of the work: The new method is used to detect the wormhole attack

and secure the data in WSN. It can also monitor the forward packets from

packet drop, delay, modifying packets and adversaries misdirecting the multi

hop routing. Based on these, this paper creates a new framework which is for

detection of wormhole attack in WSN.

Benefits of Proposed Work

This work is not used a specified hardware. The proposed methodology, which

provides detection of wormhole attack in less time, identify the suspected node

or attacker node, which also calculates energy level of each node in real time

using monitor module. The trustworthiness of each node is also calculated. The

proposed method also identifies Message passing node and reply message nodes

with help of trust manager. Overall, it improves the performance of WSN.

Fast link

r

P

s

t

u

m1

m2

Q

International Journal of Pure and Applied Mathematics Special Issue

1746

Page 5: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

4. Design and Architecture

In this part, the proposed method is discussed, which is used to detect the

wormhole attack in WSN. The Packet drop, delay, modifying packets and

adversary misdirecting the multi hop routing are used to secure and analyses the

performance of the proposed system against the wormhole attack. WSN which

gives protection against identify the deception through replaying routing

information. An adversary can exploit this detect to lunch the harmful or even

devastating attacks against the routing protocols including wormhole attack.

The proposed method, which observes the behaviors of each node in the

network, also gives the good performance in the network based routing

calculation done in the work, is done on the basis of shortest path to the sink

node. The energy watcher module which monitors the energy level of each

node, by which packet is transmitted. The routing table, node’s energy level

and data will be forwarded to trust agent module which calculates the trust level

of each node on the basis of information provided by the routing agent and

energy watcher module. If the calculated value is less than between 0.9 and

0.99, then the suspected node is identified as replaying the messages and

wormhole attack is detected.

Algorithm of Simulation Step 1: Start

Step 2: Node initialization (No of nodes used in network)

Step 3: Route selection

Step 4: Routing Agent

i. Neighbor detection go to step 6 with periodic “hello packet”

ii. Topology detection [Maintaining Routing Table]

iii. Routing calculation go to step 6 with data

Step 5: Energy watcher

Step 6: Trust manager

i. Information collection

ii. Trust calculation

Step 7: Check Trust Value

i. If yes, go to step 8

ii. else, go to step 3

Step 8: Wormhole attack detected

Step 9: Stop

5. Components of Proposed Methodology

1. Node initialization: it is the process of deploying the sensor nodes to

form a network to perform a particular task.

2. Route selection: if node A waits to transmit the data from a base station

to other nodes, node A observes the neighboring node position and

forwards the data by considering the trust level and the energy level of

node.

International Journal of Pure and Applied Mathematics Special Issue

1747

Page 6: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

3. Routing agent: in routing agent, there are the three modules, namely

neighbor detection, topology detection and routing calculation,

considered for forwarding data to other hops. Neighbor detection which

uses neighbor selection algorithm to forward the base station. Topology

detection, which is used to identify and for data packet transfer from one

node to next node. The routing calculation module which is used to find

the shortest path between a node A and next hop.

4. Energy watcher: the energy level of each node is monitored and node’s

energy can be calculated. It also checks whether nodes are have energy

enough to forward a packet from one node to another.

5. Trust manager: trust manager which is one of the module used in this for

calculating the trust of each node based on routing information, neighbor

behavior and energy level of nodes, computes the trust of each node and

assign to another. The node is identified by having more trust level as

trustworthiness.

The trust to the neighboring node X by the node n, and it is given by the following.

Tn(t) = [𝑍𝑛 𝑖 ∗ 𝑇𝑛(𝑖)]𝑥𝑖=0 (1)

Where Zn(i) is the weight of the ith

trust category to n and 𝑇𝑛(𝑖) is the

situational trust of n in the ith

trust category.

Form equation (1), there is the two equations are derived.

Ac = 𝐸𝑠−𝐸𝑓

𝐸𝑠+𝐸𝑓 for Es + Ef ≠ 0 𝑒𝑙𝑠𝑒 Ac=0 (2)

Ad = 𝐹𝑠−𝐹𝑓

𝐹𝑠+𝐹𝑓 for Fs + Ff ≠ 0 𝑒𝑙𝑠𝑒 Ad=0 (3)

Hence a value of -1 represents complete distrust, a values of 0 implies non-

contributing event and a value of +1 represents the absolute trust in a particular

event. Based on The probability of trust level of neighbor estimation, this

neighbor correctly delivers the received data to the base station.

6. Result and Discussion

The proposed work in this paper presents an efficient methodology to detect

wormhole attack in wireless sensor network. Energy watcher and trust manager

are used to calculate the performance of proposed work.

Activation Latency for Passive Adversary

The fig.3 shows that the performance of efficient wormhole attack detection

which is calculated by plotting the graph between threshold value and time to

estimate the activation latency for passive adversary.

International Journal of Pure and Applied Mathematics Special Issue

1748

Page 7: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

Fig. 3: Activation Latency for Passive Adversary

Activation Latency for Active Adversary

The fig.4 shows that the performance of efficient wormhole attack detection

which is calculated by plotting the graph between threshold value and time to

estimate the activation latency for active adversary.

Fig. 4: Activation Latency for Active Adversary

Detection Latency for Passive Adversary

The fig.5 shows that the performance of efficient wormhole attack detection

which is calculated by plotting the graph between threshold value and time to

estimate the detection latency for passive adversary.

0

2

4

6

8

10

12

14

0 0.2 0.4 0.6 0.8

Time(s)

Threshold(%)

Proposed Method

Existing Method

0

2

4

6

8

10

12

14

0 0.2 0.4 0.6 0.8

Time(s)

Threshold(%)

Proposed Method

Existing Method

International Journal of Pure and Applied Mathematics Special Issue

1749

Page 8: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

Fig. 5: Detection Latency for Passive Adversary

Detection Latency for Active Adversary

The fig.6 shows that the performance of efficient wormhole attack detection

which is calculated by plotting the graph between threshold value and time to

estimate the detection latency for active adversary.

Fig. 6: Detection Latency for Active Adversary

7. Conclusion

WSN can be used a number of nodes which can transfer the data from one

network to another network without making use of cables and communicate

each other nodes through base station. The lifetime of networks is limited

because all the nodes are depending upon the residual energy of nodes in the

0

1

2

3

4

5

6

7

0 0.2 0.4 0.6 0.8

Time(s)

Threshold(%)

Proposed Method

Existing Method

0

1

2

3

4

5

6

7

8

0 0.2 0.4 0.6 0.8

Time(s)

Threshold(%)

Proposed Method

Existing Method

International Journal of Pure and Applied Mathematics Special Issue

1750

Page 9: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

network. The detection of wormhole attack, which, is proposed in the paper, is

effective method because it uses the energy watcher and trust manager. The

energy watcher module which maintains the energy of each nodes and trust

manager which holds the characters of each node in the network.

References

[1] Bhaskar Krishnamachari, Deborah Estrin, and Stephen B. Wicker. “The impact of data aggregation in wireless sensor networks”. In Proc. of IEEE ICDCSW, pages 575–578, Washington, DC, USA, 2002. IEEE Computer Society.

[2] L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks,” presented at the NDSS, 2004.

[3] H. Krawczyk, R. Canetti, and M. Bellare, “HMAC: keyed hashing for message authentication,” Tech. Rep. RFC 2104, Internet Society, Reston, Va, USA, 1997.

[4] R. Poovendran and L. Lazos, “A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks,” Wireless Netw., vol. 13, pp. 27–59, 2007

[5] L. Buttyan, L. Dora, and I. Vajda, “Statistical wormhole detection in sensor networks,” in Proc. IEEE ESAS, 2005, pp. 128–141

[6] I. F. Akyildiz, W. Su, Y. Sankara subramaniam, and E. Cayirci. “Wireless sensor networks: a survey”. Computer Networks, 38(4):393–422, 2002.

[7] S. Capkun, L. Buttyan, and J.-P. Hubaux, “Sector: Secure tracking of node encounters in multihop wireless networks,” in Proc. ACM SASN, 2003, pp. 21–32.

[8] I. Khalil, S. Bagchi, and N. B. Shroff, “Mobiworp: Mitigation of the wormhole attack in mobile multihop wireless networks,” in Proc. IEEE SecureComm, 2006, pp. 1–12

[9] J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, “Truelink: A practical countermeasure to the wormhole attack in wireless networks,” in Proc. IEEE ICNP, 2006, pp. 75–84.

[10] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location-based compromisetolerant security mechanisms for wireless sensor networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 247–260, Feb. 2006.

[11] W. Du, L. Fang and P. Ning, “LAD: Localization anomaly detection for wireless sensor networks,” Journal of Parallel and Distributed Computing, vol. 66(7), 2006, pp. 874~886.

[12] Khin Sandar Win, Pathein Gyi, “Analysis of Detecting Wormhole Attack in Wireless Networks,” Proceedings Of World Academy Of

International Journal of Pure and Applied Mathematics Special Issue

1751

Page 10: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

Science Engineering And Technology Volume 36 December 2008.

[13] Y.-C. Hu, A. Perrig, and D. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks,” in Proc. IEEE INFOCOM, 2003, vol. 3, pp. 1976–1986.

International Journal of Pure and Applied Mathematics Special Issue

1752

Page 11: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

1753

Page 12: A Reliable and Efficient Design for Detection of Wormhole Attack … · 2018-06-16 · A Reliable and Efficient Design for Detection of Wormhole Attack in Wireless Sensor Networks

1754