Total views : 246

Wormhole Attack Detection in Zigbee Wireless Sensor Networks using Intrusion Detection System

Affiliations

  • Department of Electronics Engineering, Pondicherry University, Puducherry, India

Abstract


Objective: Wormhole attack is a serious threat to Wireless Sensor Networks (WSN) due to its wireless broadcast nature of communication, multi hop nature and resource constraints. Hence, to enhance the security and energy efficiency of a WSN, energy efficient Intrusion Detection System (IDS) is needed to detect and mitigate the attacks. In this paper, an Energy Efficient Intrusion Detection System (EE-IDS) has been proposed for IEEE 802.15.4 based WSN to detect and mitigate the effect of wormhole attacks. Methods/Statistical Analysis: The wormhole attack is detected by using the optimized watchdog system. The optimized watchdog mechanism is a trust based method which is used to evaluate the validity of all the nodes of the network. In proposed approach, the optimization has been done in the selection of watchdog nodes, in order to consume less energy compared to that of the existing approaches. The detection of wormhole attack is also completely relies on the three main factors like trustworthiness, packet delivery ratio and end-to-end delay. Findings: The proposed EE-IDS is examined through extensive simulations by considering static and mobility model, and then it is compared with the existing IDS for detecting wormhole attacks. The performance of zigbee WSN is analyzed in terms of metrics such as packet delivery ratio, average end-to-end delay and energy consumption for static model. In mobility model, the Proposed EE-IDS is evaluated in terms of detection rate, false positive rate and detection time. Application/ Improvements: The proposed EE-IDS is used to detect the wormhole attack and improve the energy efficiency in zigbee based wireless sensor networks, which can be used for military, environmental, health and commercial applications.

Keywords

IEEE802.15.4 based WSN, Intrusion Detection System, Optimized Watchdog, Wormhole Attack.

Full Text:

 |  (PDF views: 241)

References


  • Colin P, Flynn O. Message Denial and Alteration on IEEE Low-Power Radio Networks. 4th IEEE International Conference on New Technologies, Mobility and Security (NTMS). 2011 January; p.1-5.
  • Radosveta Sokullu, Orhan Dagdeviren, Ilker Korkmaz. On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack. The Second International Conference on Sensor Technologies and Applications. 2008 August; p. 673-78.
  • X. Du and H.-H. Chen. Security in wireless sensor networks. IEEE Wireless Communications. 2008; 15(4):60–66.
  • Amudhavel J et al. A Survey on Intrusion Detection System: State of the Art Review. Indian Journal of Science and Technology. 2016 March; 9(11).
  • Sheela Evangelin Prasad SN, Srinath MV and Murtaza Saadique Basha. Intrusion Detection Systems, Tools and Techniques – An Overview. Indian Journal of Science and Technology. 2015 December; 8(35).
  • Uddin M, Alsaqour R, Abdelhaq R. Intrusion Detection System to Detect DDoS Attack in Gnutella hybrid P2P network. Indian Journal of Science and Technology. 2013 Feb; 6(2):71-83.
  • Youngho Cho and Gang Qu and Yuanming Wu. Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks. IEEE Computer Society on Security and Privacy Workshops. 2012; p.134-41.
  • Forootaninia1 A and Ghaznavi-Ghoushchi MB. An Improved Watchdog Technique Based on Power-Aware Hierarchical Design for Ids in Wireless Sensor Networks. International Journal of Network Security & Its Applications. 2012 July; 4(4):161-78.
  • Peng Zhou, Siwei Jiang, Athirai Irissappane, Jie Zhang, Jianying Zhou, and Joseph Chee Ming Te. Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs. IEEE Transactions on Information Forensics and Security. 2015 March; 10(3):613-25.
  • Hu YC, Perrig A and Johnson B. Packet leashes: a defense against wormhole attacks in wireless networks. INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2003 April; 3:1976-86.
  • Capkun S, Buttyn L and Hubaux JP. SECTOR: Secure tracking of node encounters in multi-hop wireless networks, 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN). 2003 October.
  • Hu L and Evans D. Using directional antennas to prevent wormhole attacks. Network and Distributed System Security Symposium (NDSS). 2004.
  • Lazos L et al. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach. IEEE Wireless Communications and Networking Conference. 2005; 2:1193-99.
  • Khalil I, Bagchi S, and Shroff NB. LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. International Conference on Dependable Systems and Networks (DSN’05). 2005 July; p. 612-21.
  • Yanzhi Ren et al. Detecting Wormhole Attacks in Delay-Tolerant Networks [Security and Privacy in Emerging Wireless Networks]. IEEE Wireless communications. 2010 October; 17(5):62-42.
  • Yih-Chun Hu, Adrian Perrig and David B Johnson. Wormhole Attacks in Wireless Networks. IEEE Journal on selected areas in communications. 2006 February; 24(2):370-80.
  • Network Simulator. Available from: http:///www.isi.edu/nsnam/ns.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.