A Security Scheme against Wormhole Attack in MAC Layer for Delay Sensitive Wireless Sensor Networks

Full Text (PDF, 741KB), PP.1-10

Views: 0 Downloads: 0

Author(s)

Louazani Ahmed 1,* Sekhri Larbi 1 Kechar Bouabdellah 1

1. Industrial Computing and Networking Laboratory, Computer Science Department, University of Oran, BP 1524 Oran, Algeria

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2014.12.01

Received: 3 Apr. 2014 / Revised: 21 Jul. 2014 / Accepted: 3 Sep. 2014 / Published: 8 Nov. 2014

Index Terms

Wireless Sensor Networks, Wormhole Attack, CL-MAC Protocol, Cross- Layer Optimization, Time Petri Nets, TiNA Tool

Abstract

The main objective of this paper is to secure a cross-layer, energy efficient MAC protocol (CL-MAC) dedicated to delay sensitive wireless sensor networks (WSN) for detecting and avoiding wormhole attack. CL-MAC protocol is the result of our previous research works for which the security aspects have not been taken into consideration during its design stage. To formally prove the importance of the proposed scheme, we provide a theoretical study based on Time Petri Net to analyse some important properties related to the devastating effect of the wormhole attack and its countermeasure on the CL-MAC operations. Also, we perform an experimental evaluation through the simulation using realistic scenarios in order to show the performance of the proposal in terms of energy saving, packets loss ratio and latency. The obtained results indicate the usefulness of the formal study provided in this work when applied in security context and confirm clearly a good performance of the proposed scheme against wormhole attack.

Cite This Paper

Louazani Ahmed, Sekhri Larbi, Kechar Bouabdellah, "A Security Scheme against Wormhole Attack in MAC Layer for Delay Sensitive Wireless Sensor Networks", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.12, pp.1-10, 2014. DOI:10.5815/ijitcs.2014.12.01

Reference

[1]K. Sharma and M.K. Ghose, “Wireless Sensor Networks Security: A New Approach”, In Proceedings of 16th International Conference on Advanced Computing and Communication (ADCOM 2008). Dec. 14-17, 2008, MIT Chennai.

[2]M. Meghdadi, S. Ozdemir and I. Güler, “A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks”; The Institution of Electronics and Telecommunication Engineers (IETE), vol. 28, Issues. 2. pp 89-102, 2011.

[3]M. Yasir, “An Outline of Security in Wireless Sensor Networks Threats, Countermeasures and Implementations”. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management Book, pp. 507-527, 2012.

[4] L. Hong, F. Hong and C. Fu, “Defending Against Wormhole Attack in OLSR”. Geo-spatial Information Science (Quarterly), vol. 9, Issue. 3, pp. 229-233, Sep. 2012.

[5]L. Kyuho, J. Hyojin and K. Dongkyoo, “Wormhole Detection Method Based on Location in Wireless Ad-hoc Networks”, Book chapter in New Technologies, Mobility and Security. pp. 361-372, 2007. Springer.

[6]K. Roshan and V. Bibhu, Preventive Aspect of Black hole Attack in Mobile AD Hoc Network, International Journal on Computer Network and Information Security (IJCNIS), June 2012 in MECS, 2012, 6, 49-55.

[7]C. Iwendi, A. Allen and K. Offor, “Smart Security Implementation for Wireless Sensor Network Nodes”; Journal of Wireless Sensor Networks (JWSN), vol.1. pp. 14-26, July 2013.

[8]Y. Hu, A. Perrig and D. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks”, Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976-1986. April 2003, San Francisco, California, USA.

[9]Z. Tun and A. M. Htein, “Wormhole Attack Detection in Wireless Sensor Networks”, Proceedings of world academy of science, engineering and technology, vol. 36. pp. 549-554 Dec. 2008. 

[10]K. Sharma and M. K. Ghose. “Wireless Sensor Networks: An Overview on its Security Threats”. International Journal of Computer Applications (IJCA), Special Issue on “Mobile Ad-hoc Networks” MANETs, pp. 42-45, 2010. 

[11]J. Perrig, J. Stankovich and D. Wagner, “Security in Wireless Sensors network”, Communications of the ACM. vol.47, No.6, pp. 53-57. June 2004. 

[12]B. Kechar and A. Louazani, “CL-MAC: An Energy Efficient Cross-Layer MAC Protocol with Latency Improvement in Wireless Sensor Network”. 17th International Conference on Computer Communication and Networks (ICCCN). 3-7 Aug. 2008. Virgin Institute, USA.

[13]B. Kechar. L. Sekhri and M.K. Rahmouni, “CL-MAC: Energy Efficient and Low Latency Cross-Layer MAC Protocol for Delay Sensitive Wireless Sensor Network Applications”. The Mediterranean Journal of Computers and Networks, vol.6, No.1. pp. 1-14, 2010.

[14]A. Suman, P. Saurabh and H. Verma, “A Behavioral Study of Wormhole Attack in Routing for MANET”. International Journal of Computer Applications (IJCA), vol. 26, No.10, pp. 42-46, July 2010.

[15]M. Garcia-Otero and A. Poblacion-Hernandez, “Detection of wormhole attacks in wireless sensor networks using range-free localization”, IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks Conference (CAMAD’2012). Pp. 21-25, 17-19, Sept. 2012, Barcelona, Spain.

[16]P. G. Arfaat and A.H. Mir, “The Impact of Wormhole Attack on the Performance of Wireless Ad-Hoc Networks”. International Journal of Computer Science and Technology (IJCST), vol. 2, Issue 4, 2, pp. 421-425, 2011.

[17]P. Singh and D. Kaur. “An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode”. International Journal of Computer Applications (IJCA), vol.73, No.20, pp. 26-29, July 2013.

[18]R. Maheshwari, J. Gao and S. R. Das, “Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information”, INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pp. 107-115, May 2007, Anchorage, Alaska, USA.

[19]S. kumer, T.V.P. Sundararajan and A. Shanmugam, “Performance Comparison of Three Types of Wormhole Attack in Mobile Adhoc Networks”. International Conference on Information Science and Applications (ICISA). pp 443-447, Feb. 2010, Chennai, India.

[20]M. Belkadi, R. Aoudjit, M. Daoui and M. Lalam, Energy Efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks, Int. Journal of Information Technology and Computer Science (IJITCS), 2014, 01, 50-56.

[21]A. Louazani, L. Sekhri and B. Kechar, “A Time Petri Net model for wormhole attack detection in wireless sensor networks”. 4th International Conference on Smart Communications in Network Technologies (SaCoNeT), vol. 1, pp. 1-6, June 2013, Paris, France. 

[22]B. Berthomieu and M. Menasche, “An Enumerative Approach for Analyzing Time Petri Nets”. IFIP Congress Series, Elsevier Science Publishers, vol. 9, pp. 41-46. 1983, Amsterdam, Netherland. 

[23]B. Berthomieu, P.O. Ribet and F. Vernadat, “The tool TINA - Construction of abstract state spaces for Petri Nets and Time Petri Nets”. International Journal of Production Research, vol.42, No.14. pp. 2741-2756, 2004.