SWAT: A Decentralized Self-healing Mechanism for Wormhole Attacks in Wireless Sensor Networks

نویسندگان

  • Chonho Lee
  • Junichi Suzuki
  • J. Suzuki
چکیده

This paper proposes and evaluates a decentralized self-healing mechanism that detects and recovers from wormhole attacks in wireless multi-hop sensor networks. Upon detecting a wormhole attack, the proposed mechanism, called SWAT, identifies the locations of malicious nodes (or wormhole nodes), isolates them from the network and recovers the routing structure distorted by them. SWAT is the first mechanism that performs both wormhole node isolation and routing structure recovery against wormhole attacks. Unlike many other wormhole detection mechanisms, SWAT does not require any extra networking facilities (e.g., timing analysis and localization facilities) as well as special hardware (e.g., GPS). Instead, it uses network connectivity information only in a decentralized manner. Simulation results show that SWAT yields 100% wormhole attack detection, 0% false detection, 100% wormhole node isolation and 0% false isolation in dense networks. The results also show that SWAT outperforms multi-path routing mechanisms in terms of control overhead and power consumption and outperforms another connectivity-based detection mechanism in terms of false isolation rate and recovery efficiency.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

Dawwsen: a Defense Mechanism against Wormhole Attacks in Wireless Sensor Networks

Many obstacles impede the successful deployment of sensor networks. In addition to the limited resources issue, security is a major concern especially for applications such as home security monitoring, military, and battle field applications. In this paper we present a defense mechanism against wormhole attacks in wireless sensor networks. Specifically, a simple routing tree protocol is propose...

متن کامل

A multiple criteria algorithm for planning the itinerary of mobile sink in wireless sensor networks

The mobile sink can increase the efficiency of wireless sensor networks. It moves in a monitored environment and collects the network nodes information. Thus, by the sink we can balance the power consumption and increases the network lifetime. Determining path of the sink's movement is usually modeled as an optimization problem where finding optimal solutions require collecting value of all the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008