{"title":"基于移动的无线传感器网络中虫洞攻击的检测","authors":"Manish Patel, A. Aggarwal, Nirbhay Chaubey","doi":"10.1504/IJCNDS.2018.10014500","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSNs) have many limitations in terms of their computational capability, memory, and battery power. In addition, the sensor nodes use insecure wireless communication channels. Thus, WSNs are vulnerable to many types of attacks such as jamming, sinkhole, wormhole, Sybil, and selective forwarding. Among all these attacks, detecting a wormhole attack is very difficult in mobility-based WSNs. In these WSNs, two genuine nodes that are located far apart can become one-hop neighbours for valid reasons. However, the same scenario might indicate the presence of a wormhole attack instead. Differentiating genuine nodes from malicious nodes is a highly challenging task. Our detection method is based on the concept of the rate of change of neighbouring nodes and the length of an alternative path between two nodes. The proposed method does not require any additional hardware such as synchronised clocks or timing information, GPS, or cryptographic methods that require large amounts of computational power. The simulation results indicate that our method has good detection accuracy.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Detection of wormhole attacks in mobility-based wireless sensor networks\",\"authors\":\"Manish Patel, A. Aggarwal, Nirbhay Chaubey\",\"doi\":\"10.1504/IJCNDS.2018.10014500\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks (WSNs) have many limitations in terms of their computational capability, memory, and battery power. In addition, the sensor nodes use insecure wireless communication channels. Thus, WSNs are vulnerable to many types of attacks such as jamming, sinkhole, wormhole, Sybil, and selective forwarding. Among all these attacks, detecting a wormhole attack is very difficult in mobility-based WSNs. In these WSNs, two genuine nodes that are located far apart can become one-hop neighbours for valid reasons. However, the same scenario might indicate the presence of a wormhole attack instead. Differentiating genuine nodes from malicious nodes is a highly challenging task. Our detection method is based on the concept of the rate of change of neighbouring nodes and the length of an alternative path between two nodes. The proposed method does not require any additional hardware such as synchronised clocks or timing information, GPS, or cryptographic methods that require large amounts of computational power. The simulation results indicate that our method has good detection accuracy.\",\"PeriodicalId\":209177,\"journal\":{\"name\":\"Int. J. Commun. Networks Distributed Syst.\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Commun. Networks Distributed Syst.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJCNDS.2018.10014500\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Commun. Networks Distributed Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJCNDS.2018.10014500","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of wormhole attacks in mobility-based wireless sensor networks
Wireless sensor networks (WSNs) have many limitations in terms of their computational capability, memory, and battery power. In addition, the sensor nodes use insecure wireless communication channels. Thus, WSNs are vulnerable to many types of attacks such as jamming, sinkhole, wormhole, Sybil, and selective forwarding. Among all these attacks, detecting a wormhole attack is very difficult in mobility-based WSNs. In these WSNs, two genuine nodes that are located far apart can become one-hop neighbours for valid reasons. However, the same scenario might indicate the presence of a wormhole attack instead. Differentiating genuine nodes from malicious nodes is a highly challenging task. Our detection method is based on the concept of the rate of change of neighbouring nodes and the length of an alternative path between two nodes. The proposed method does not require any additional hardware such as synchronised clocks or timing information, GPS, or cryptographic methods that require large amounts of computational power. The simulation results indicate that our method has good detection accuracy.