SeRWA: A secure routing protocol against wormhole attacks in sensor networks

被引:29
|
作者
Madria, Sanjay [1 ]
Yin, Jian [1 ]
机构
[1] CS, UMR, Rolla, MO USA
基金
美国国家科学基金会; 日本学术振兴会;
关键词
Sensor networking; Wormhole attack; Security; Routing;
D O I
10.1016/j.adhoc.2008.09.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A wormhole attack is particularly harmful against routing in sensor networks where an attacker receives packets at one location in the network, tunnels and then replays them at another remote location in the network. A wormhole attack can be easily launched by an attacker without compromising any sensor nodes. Since most of the routing protocols do not have mechanisms to defend the network against wormhole attacks, the route request can be tunneled to the target area by the attacker through wormholes. Thus, the sensor nodes in the target area build the route through the attacker. Later, the attacker can tamper the data, messages, or selectively forward data messages to disrupt the functions of the sensor network. Researchers have used some special hardware such as the directional antenna and the precise synchronized clock to defend the sensor network against wormhole attacks during the neighbor discovery process. In this paper, we propose a Secure Routing protocol against Wormhole attacks in sensor networks (SeRWA). SeRWA protocol avoids using any special hardware such as the directional antenna and the precise synchronized clock to detect a wormhole. Moreover, it provides a real secure route against the wormhole attack. Simulation results show that SeRWA protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than 10%). The average energy usage at each node for SeRWA protocol during the neighbor discovery and route discovery is below 25 mJ, which is much lower than the available energy (15 kJ) at each node. The cost analysis shows that SeRWA protocol only needs small memory Usage at each node (below 14 kB if each node has 20 neighbors), which is suitable for the sensor network. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:1051 / 1063
页数:13
相关论文
共 50 条
  • [1] Secure positioning of wireless sensor networks against wormhole attacks
    Yu, Xiuwu
    Wang, Xun
    Liu, Yong
    [J]. TELECOMMUNICATION SYSTEMS, 2024,
  • [2] A hierarchical secure routing protocol against black hole attacks in sensor networks
    Yin, Jian
    Madria, Sanjay Kumar
    [J]. IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 376 - +
  • [3] Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks
    Ahutu, Ohida Rufai
    El-Ocla, Hosam
    [J]. IEEE ACCESS, 2020, 8 : 63270 - 63282
  • [4] Designing a Secure Architecture against Wormhole Attacks in Wireless Sensor Networks
    Jigalur, Rohit S.
    Suresha
    Bushan, C.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [5] Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks
    Anwar, Raja Waseem
    Bakhtiari, Majid
    Zainal, Anazida
    Abdullah, Abdul Hanan
    Qureshi, Kashif Naseer
    [J]. 2015 INTERNATIONAL CONFERENCE ON SMART SENSORS AND APPLICATION - ICSSA 2015, 2015, : 56 - 59
  • [6] A Secure Routing Protocol against Heterogeneous Attacks in Wireless Adhoc Networks
    Babu, E. Suresh
    Nagaraju, C.
    Prasad, M. H. M. Krishna
    [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 339 - 344
  • [7] End-to-end protocol to secure ad hoc networks against wormhole attacks
    Khurana, Sandhya
    Gupta, Neelima
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 994 - 1002
  • [8] Secure DV-Hop localization scheme against wormhole attacks in wireless sensor networks
    Labraoui, Nabila
    Gueroui, Mourad
    Aliouat, Makhlouf
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2012, 23 (04): : 303 - 316
  • [9] Defenses Against Wormhole Attacks in Wireless Sensor Networks
    Ma, Rui
    Chen, Siyu
    Ma, Ke
    Hu, Changzhen
    Wang, Xiajing
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 413 - 426
  • [10] A Secure Routing and Aggregation Protocol for Sensor Networks
    Gui Nike
    Miao Yi
    Hu Jianbin
    Chen Zhong
    [J]. CHINA COMMUNICATIONS, 2009, 6 (04) : 66 - 70