Title :
Anomaly detection in geographic routing protocols
Author :
Sookhak, M. ; Haghparast, Mahboobeh ; Gani, Abdullah
Author_Institution :
Dept. of Comput. Syst. & Technol., Univ. of Malaya, Kuala Lumpur, Malaysia
Abstract :
Providing security for sensor nodes is one of the important issues in WSNs because they are deployed in the harsh environment. WSNs are distributed in nature and preparing centralized security solutions cannot be a suitable for WSNs. There are various sensor holes that may be formed in WSNs and create variations in network topologies and also threaten the upper layer applications such as sinkhole, black holes, wormholes and Sybil attack. Wormhole attack occur when two or more malicious nodes receive packets at one point of the network and transmit them to another malicious node by a wired or wireless tunnel; wormhole is carried out easily without requiring compromising sensor nodes in the network. Also, the wormhole attack may cause other type of attacks like DoS or Sybil attack. Using a cryptographic technique is not enough to prevent wormhole attack. In this study, a new scheme is proposed based on modifying the forwarding packet process, selecting the best neighbour and using hop count technique in order to prevent and detect wormhole and thus, reduce the number of untrusted packets in geographic routing protocols. Performance evaluation of the proposed scheme is done using mathematical modelling and simulation. The results are compared with some related works such as Authentication of Nodes Scheme (ANS) and Reverse Routing Scheme (RRS).
Keywords :
cryptography; geography; routing protocols; telecommunication network topology; wireless sensor networks; ANS; DoS attack; RRS; Sybil attack; WSN; anomaly detection; authentication of nodes scheme; black holes; cryptographic technique; forwarding packet process; geographic routing protocols; hop count technique; malicious nodes; mathematical modelling; network topology; reverse routing scheme; sensor holes; sensor nodes; simulation; sinkhole; wireless tunnel; wormholes attack; Ad hoc networks; Authentication; Digital signatures; Routing; Routing protocols; Symmetric matrices; Wireless sensor networks; DoS; Sybil attack; WSN; geographic routing protocol; sink/black holes; wormhole;
Conference_Titel :
Education and e-Learning Innovations (ICEELI), 2012 International Conference on
Conference_Location :
Sousse
Print_ISBN :
978-1-4673-2226-3
DOI :
10.1109/ICEELI.2012.6360604