Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks

被引:30
|
作者
Ahutu, Ohida Rufai [1 ]
El-Ocla, Hosam [1 ]
机构
[1] Lakehead Univ, Dept Comp Sci, Thunder Bay, ON P7B 5E1, Canada
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Wireless sensor networks; Routing; Routing protocols; Energy consumption; Security; IEEE; 802; 15; Standard; Wireless; sensor; networks; MAC; routing; wormhole; attack; centralized; energy; consumption; 4; AD HOC NETWORKS; ALGORITHM;
D O I
10.1109/ACCESS.2020.2983438
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nodes in wireless sensor networks (WSN) are resource and energy-constrained because they are generally batteries powered and therefore have limited computational capability. Due to the less secure environment in WSN, some malicious nodes at one point can tunnel packets to another location to damage the network in terms of packets dropping and eavesdropping and this is a so-called wormhole attack. Many of the current protocols solve the wormhole attack problem in isolation from the node energy consumption. However, some other proposed solutions consider reducing the energy consumption to detect such attacks but still it is needed to probe better performance. In this paper, we present a lightweight multi-hop routing protocol for 802.15.4 WSN that aims to minimize the energy consumption and also to detect the wormhole attacks. Simulation results prove that our MAC Centralized Routing Protocol (MCRP) outperforms other existing similar protocols.
引用
收藏
页码:63270 / 63282
页数:13
相关论文
共 50 条
  • [1] Detecting wormhole attacks in wireless sensor networks
    Xu, Yurong
    Chen, Guanling
    Ford, James
    Makedon, Fillia
    [J]. CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 267 - +
  • [2] SeRWA: A secure routing protocol against wormhole attacks in sensor networks
    Madria, Sanjay
    Yin, Jian
    [J]. AD HOC NETWORKS, 2009, 7 (06) : 1051 - 1063
  • [3] Mitigation of Blackhole Attacks and Wormhole Attacks in Wireless Sensor Networks Using AODV Protocol
    Kaur, Taranpreet
    Kumar, Rajeev
    [J]. 2018 THE 6TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE 2018), 2018, : 288 - 292
  • [4] Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks
    Anwar, Raja Waseem
    Bakhtiari, Majid
    Zainal, Anazida
    Abdullah, Abdul Hanan
    Qureshi, Kashif Naseer
    [J]. 2015 INTERNATIONAL CONFERENCE ON SMART SENSORS AND APPLICATION - ICSSA 2015, 2015, : 56 - 59
  • [5] DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS USING HOP COUNT ANALYSIS
    Yao, Lan
    Zhao, Zhibin
    Yu, Ge
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (01): : 229 - 243
  • [6] Analysis of Wormhole Attacks in Wireless Sensor Networks
    Patel, Manish
    Aggarwal, Akshai
    Chaubey, Nirbhay
    [J]. RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 33 - 42
  • [7] Prevention of Wormhole Attacks in Wireless Sensor Networks
    Aldhobaiban, Dema
    Elleithy, Khaled
    Almazaydeh, Laiali
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, : 287 - 291
  • [8] An Efficient Approach for Detecting Wormhole Attacks in AODV Routing Protocol
    Thakurta, Parag Kumar Guha
    Guin, Rajeswar
    Bandyopadhyay, Subhansu
    [J]. ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 217 - 227
  • [9] A centralized energy-efficient routing protocol for wireless sensor networks
    Muruganathan, SD
    Ma, DCF
    Bhasin, RI
    Fapojuwo, AO
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2005, : S8 - S13
  • [10] VCH-ECCR: A Centralized Routing Protocol for Wireless Sensor Networks
    Pachlor, Rohit
    Shrimankar, Deepti
    [J]. JOURNAL OF SENSORS, 2017, 2017