본문 바로가기
HOME> 논문 > 논문 검색상세

논문 상세정보

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

Sharif, Lukman    (London College of Research   ); Ahmed, Munir    (College of Computer Science and Engineering, Taibah University  );
  • 초록

    Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.


  • 주제어

    Secure Routing .   Routing Attacks .   Routing Protocols .   Wireless Sensor Networks (WSN) .   Wormhole Attack.  

  • 참고문헌 (26)

    1. Rehana, J. (2009). Security of wireless sensor network. Seminar on Internetworking (TKK T-110.5190). Helsinki University of Technology 
    2. Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS): Vol.4, No.1 & 2 
    3. Hanapi,. Z.M. Ismail,. M,. Jumari,. K. & Mahdavi,. M. (2009). Dynamic window secured implicit geographic forwarding routing for wireless sensor network. World Academy of Science, Engineering and Technology 
    4. Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks, IEEE Communications Magazine (p 70-75) 
    5. Karlof, C., & Wagner,. D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks Journal: Special Issue on Sensor Network Applications and Protocols. Vol.1, (p293-315), Elsevier Publications 
    6. Naeem,. T & Loo,. K. K. (2009). Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks. International Journal of Digital Content Technology and its Applications: Volume 3, Number 1. (p 89-90) 
    7. Lee , J. C., Leung, V. C. M., Wong, K. H., Cao, J., & Chan, H. C. B. (2007). Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wireless Communications, (p76-84) 
    8. Kavitha, T., & Sridharan, D. (2010). Security vulnerabilities in wireless sensor networks: a survey. Journal of Information Assurance and Security 5, (p31-44) 
    9. Bojkovic,. Z. S., Bakmaz,. B. M,. & Bakmaz,. M. R. (2008). Security issues in wireless sensor networks. International Journal of Communications: Issue 1, Volume 2 
    10. Raj,. P. N. & Swadas,. P. B,. (2009). DPRAODV: A dynamic learning system against blackhole attack in AODV based MANET. International Journal of Computer Science Issues (IJCSI): Vol.2 
    11. Venkatraman, L., Agrawal, D. P. (2003). Strategies for enhancing routing security in protocols for mobile ad hoc networks. In Journal for Parallel Distributed Computing. 63 (p 214-227) 
    12. Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of Next-Generation Networks (IJNGN) 
    13. Kaissi, R. E., Kayssi, A., Chehab, A., & Dawy, Z. (2005). DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks. The Second International Conference on Innovations in Information Technology (IIT’05). American University of Beirut. Beirut, Lebanon. 
    14. Karlof, C., & Wagner,. D. (2005). Summary of “secure routing in wireless sensor networks: attacks and countermeasures”. In Seminar on Theoretical Computer Science 
    15. Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis & defenses. In Proceedings of Third International Symposium on Information Processing in Sensor Networks. (p259-268). (ACM 1-58113-846-6) 
    16. Jen, S. M., Laih,. C.S., and KuoW,. C. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. In Sensors 
    17. Kumar, H., Sarma, D., & Kar, K. (2006). Security threats in wireless sensor networks. IEEE 
    18. Zhou, Y., Fang, Y. & Zhang, Y. (2008). Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials. Vol:10, Issue 3, (p 6-28) 
    19. Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: a survey. Security in Distributed, Grid and Pervasive Computing. (p 3-5, 10-15) 
    20. Santi, P. (2005). Topology control in wireless ad hoc and sensor networks. Chichester, England: John Wiley & Sons 
    21. Hanapi, Z. M., Ismail, M., Jumari, K., & Mirvaziri, H. (2008). Analysis of routing attacks in wireless sensor network. In Proceedings of International Cryptology Workshop and Conference (Cryptology2008). (p 202-214). ISBN 978-983-4069 
    22. Khalil, I., Bagchi, S., & Shroff, N. B. (2007). Liteworp: detection and isolation of the wormhole attack in static multi-hop wireless networks. Computer Networks. Vol 51(15) 
    23. Hu, Y. C., Perrig, A. & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In IEEE Infocom 
    24. Law, Y. W., & Havinga, P. (2005). How to secure a wireless sensor network. (p 89-95) 
    25. Wood, A. & Stankovic, J. (2002). Denial of service in sensor networks. In Computer. Vol 35, (p 54 - 62) 
    26. Znaidi, W., Minier, M., & Babau, J. P. (2008). An ontology for attacks in wireless sensor networks. Institut National De Recherche En Informatique Et En Automatique 

 활용도 분석

  • 상세보기

    amChart 영역
  • 원문보기

    amChart 영역

원문보기

무료다운로드
유료다운로드

유료 다운로드의 경우 해당 사이트의 정책에 따라 신규 회원가입, 로그인, 유료 구매 등이 필요할 수 있습니다. 해당 사이트에서 발생하는 귀하의 모든 정보활동은 NDSL의 서비스 정책과 무관합니다.

원문복사신청을 하시면, 일부 해외 인쇄학술지의 경우 외국학술지지원센터(FRIC)에서
무료 원문복사 서비스를 제공합니다.

NDSL에서는 해당 원문을 복사서비스하고 있습니다. 위의 원문복사신청 또는 장바구니 담기를 통하여 원문복사서비스 이용이 가능합니다.

이 논문과 함께 출판된 논문 + 더보기