Performance Analysis of Worm-Hole Attack in Wireless Sensor Network using AODV Routing Protocol

International Journal of Electronics and Communication Engineering
© 2015 by SSRG - IJECE Journal
Volume 2 Issue 2
Year of Publication : 2015
Authors : Shweta Dalke and Pallavi Pahadiya
pdf
How to Cite?

Shweta Dalke and Pallavi Pahadiya, "Performance Analysis of Worm-Hole Attack in Wireless Sensor Network using AODV Routing Protocol," SSRG International Journal of Electronics and Communication Engineering, vol. 2,  no. 2, pp. 7-14, 2015. Crossref, https://doi.org/10.14445/23488549/IJECE-V2I2P102

Abstract:

Wireless sensor networks continue to grow, and becoming a very popular technology, so it needs some effective security mechanisms. In sensor networks, sensor nodes interact with the sensitive data and operate in hostile environments. The wireless sensor networks are being used in many ways. Traditionally, it has been used in the high-end application such as radiation and nuclear-threat detection systems, weapons sensors for ships, biomedical applications, habitat sensing and seismic monitoring The wormhole attack is also one of the severe attacks of WSN. The wormhole attack is basically launched by a pair of collaborating nodes. In wormhole attack two collaborating attacker nodes occupy strong strategic locations in two different parts of the network and advertise to have the shortest path for transmitting data and make wormhole tunnel.. This paper discusses some of the techniques put forwarded by researchers to detect and prevent worm hole attack in WSN using QualNet simulator.

Keywords:

WSN ,worm hole attack,QualNet, Malicious Node.

References:

[1] C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", in Elsevier's Adhoc Network Journal Special Issue on Sensor Network Application and Protocols, vol.l, issue.2-3, pp.293-315, September2003
[2] Devesh Jinwala, "Ubiquitous Computing: Wireless Sensor Network Deployment, Models, Security, Tbreats and Challenges", in National conference NCIIRP-2006, SRMIST, pp. 1-8, April 2006.
[3] Rouba EI Kaissi, Ayman Kayssi, Ali Chehab and Zaher Dawy, "DA WWSEN: A Defense Mechanism against Wormhole Attacks In Wireless Sensor Networks", in The Second International Conference on Innovations In Information Technology , pp. 1-10, 2005.
[4] M. G. Zapata and N. Asokan. Securing ad hoc routing protocols. In WISE, September 2002.
[5] AI-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon Hong. Security in wireless sensor networks: issues and challenges. In Proc. of the 8th International Conference on Advanced Communication Technology, volume 2, Feb. 2006, pp. 1043-1048.
[6] Qualnet Developer Website https://www.scalable-networks.com/products/qualnet/.
[7] I. Khalil, S. Bagchi, and N.B. Shroff. “LITEWORP: A lightweight countermeasure for the wormhole attack in multi-hop wireless networks,” Proceedings of the International Conference on Dependable Systems and Networks, pp. 612−41, 2005.
[8] T. Korkmaz. “Verifying physical presence of neighbors against replay-based attacks in wireless ad-hoc networks,” International Conference On Information Technology: Coding and Computing 2005(ITCC 2005), pp. 704−9, 2005.
[9] Y.C. Hu, A. Perring, and D. Johnson. “Rushing attacks and defense in wireless ad-hoc  network routing protocols,” ACM Workshop on Wireless Security, pp. 30−40, 2003.
[10] L. Buttyan and J.P. Hubaux. “Security and cooperation in wireless networks,” Cambridge University Press Textbook, Draft Ver.1.5.1, 2007.