Detection of wormhole attacks on IPv6 mobility-based wireless sensor network (2024)

  • Gu-Hsin Lai1

EURASIP Journal on Wireless Communications and Networking volume2016, Articlenumber:274 (2016) Cite this article

  • 3308 Accesses

  • 35 Citations

  • Metrics details

Abstract

New communication networks are composed of multiple heterogeneous types of networks including Internet, mobile networks, and sensor networks. Wireless sensor networks have been applied to various businesses and industries since the last decade. Most sensors have the ability of communication and the requirement of low power consumption. 6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks) plays an important role in this convergence of heterogeneous technologies, which allows sensors to transmit information using IPv6 stack. Sensors perform critical tasks and become targets of attacks.

Wormhole attack is one of the most common attacks to sensor networks, threatening the network availability by dropping data or disturbing routing paths. RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is a standard routing protocol commonly used in sensor networks. This study proposes a RPL-based wormhole detection mechanism. The rank of a node-defined RPL is adopted to measure the distance. The proposed detection method discovers malicious wormhole nodes if unreasonable rank values are identified. The experimental results show that the proposed detection method can identify wormholes effectively under various wireless sensor networks.

1 Introduction

Wireless sensor networks with IoT (Internet of Things) have been applied to many applications such as ecosystem monitoring, disaster watch, building automation, health monitoring, object tracking, and plant control. The sensor data carry out important information such as vital signals or disaster alerts; transmission failure or error data might cause system malfunction or serious incidents. The existing Internet protocol IPv4 could only provide about 4 billion public IP addresses; the limited IP spaces constrain the growth of wireless sensor network applications.

IPv6 is the latest version of Internet Protocol, a communication protocol that provides an identification and location system for the network devices in the new type of communication networks. Many sensors and tiny devices facilitate IPv6 to provide connectivity.

In wireless sensor networks, the network topology could change due to a weak mobility (new nodes join the network or hardware failure of existing devices) or strong mobility (physical movement of nodes) [1]. However, wormhole attack could also make topology change in wireless sensor network. Therefore, building a security mobility management mechanism is very important for wireless sensor networks.

A typical architecture of wireless sensor networks is illustrated in Fig.1, where all the sensors transmit data to the root. Wormhole attack is one of the most common attacks in sensor networks. Figure2 illustrates an example of wormhole where the two malicious nodes, M1 and M2, form a wormhole tunnel T1 through which redirects the transmissions. Some routing paths going through the wormhole tunnel might be shorter than the normal multi-hop routes [24]. Therefore, wormhole attacks may change the original routing paths, and the wormhole nodes may eavesdrop or discards the data going through the wormhole tunnel. Furthermore, the two wormhole end nodes consume more power energy than others. Once their resources are exhausted, the sensor network might not operate properly. Wormhole attacks compromise the network availability and data privacy and may cause serious security problem in sensor networks.

An example of wireless sensor network topology

Full size image

An example of wormhole attack

Full size image

According to the wireless sensor network architecture, each node usually is only aware of its neighbor nodes and possesses limited resources. Centralized and sophisticated detection methods might not be feasible because sensor nodes only have limited computing power. On the other hand, equipping with additional hardware for all sensor nodes is costly. Hence, detection systems requiring additional hardware might not be practical.

Based on the above constraints, this study proposes a distributed detection method by applying the standard routing protocol IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), available in all the sensor nodes to identify wormhole attacks without additional hardware. RPL [5, 6] is a standard routing protocol for wireless sensor networks [7]. However, RPL is vulnerable to wormhole attacks [8]. The proposed detection method applies the rank information from RPL to estimate the relative distance to the root node; the rank value will be compared with that of the neighbors; if the discrepancy exceeds a threshold value, it signals an anomaly where a wormhole might exist.

The main contributions of this paper are as follows:

  1. 1.

    The proposed approach builds a security mobility management mechanism in wireless sensor network.

  2. 2.

    The proposed approach does not need any extra hardware or special powerful nodes which were required by the previous work [2, 9, 10].

  3. 3.

    The proposed mechanism is based on an existing protocol, the proposed mechanism. It could be implemented on existing wireless sensor network hardware.

  4. 4.

    The proposed mechanism is distributed; no centralized analysis is needed. It means no additional communication is needed.

  5. 5.

    The proposed system needs only few computing resource, the lifetime of battery of devices would not be affected.

2 Related work

In this paper, we propose a wormhole detection mechanism based on RPL routing protocol. In this section, prior works about detection of wormhole attack are reviewed in Section2.1. In Section2.2, we investigate the vulnerability of RPL routing protocol, and some RPL-based wormhole detection approaches are reviewed.

2.1 Prior work of detecting wormhole attacks

Wormhole attacks in wireless sensor networks were introduced by Sanzgiri [11], Papadimitratos [12], and Hu [2, 3, 8]. In a wormhole attack, a wormhole tunnel is constructed by two malicious nodes. Malicious nodes will “tunnel” their received routing information to another point in the network and then replay them. Once the wormhole tunnel is constructed, malicious nodes could eavesdrop on traffic from their neighbor nodes, drop packets or to perform man-in-the-middle attacks [4].

Hu et al. proposed two types of packet leashes: geographic leashes and temporal leashes to prevent wormhole attacks [4]. Leashes are designed to protect against wormholes over a single hop wireless transmission. Geographical leash will ignore any messages from unreasonable distance, and temporal leash will ignore any packets with unreasonable lifetime [4]. However, to construct packet leashes, all nodes must have synchronized clocks and their own position. It is impractical in most wireless sensor network environment.

A lightweight wormhole detection approach called LITEWORP was proposed by Khalil et al. [9]. In LITEWORP, each node builds its two-hop neighbor list. By monitoring all control traffic of neighbor, LITEWORP could identify and isolate malicious node. However, monitoring and extracting every neighbors’ traffic result in extra overload. Moreover, it is not always possible to find guard node for particular link. The proposed system is not suitable for nodes with limited battery capacity. Khalil et al. also proposed a routing protocol called MobiWorp to detect and isolate wormhole attack [13]. MobiWorp rely on a secure central authority (CA) for global tracking of node positions. MobiWorp also deployed a special node called guard node to maintain a black list and monitor network traffic. However, CA and guard node are impractical in some wireless sensor network applications.

Choi et al. proposed a Wormhole Attack Prevention (WAP) algorithm which measured the round-trip time (RTTs) between neighbors, identifying that two neighbors which are not within each other’s communication range are supposed to be suffering from wormhole attack [14]. But, WAP algorithm could only be suitable for wireless sensor network applications with a lot of nodes. WAP algorithm could not detect false positive alarm while affected nodes only have few neighbor nodes due to lack of enough neighbor nodes’ information.

2.2 IPv6 Routing Protocol for Low-Power and Lossy Networks

The RPL became a standard routing protocol for wireless sensor networks [6]. RPL is primarily designed for 6LoWPAN (IPv6 over Low-powered Wireless Personal Area Networks). Because IPv6 provide almost unlimited IP space, it is suitable for wireless sensor network applications for point-to-point communication or point-to-multicast communication among tiny nodes. 6LoWPAN network is a wireless sensor network which supports IPv6. 6LoWPAN uses IPv6 as Internet layer and IEEE 802.15.4 as data link and physical layer [7]. Differ from typical stand-alone wireless sensor networks, devices of wireless sensor network applications only have limited resources, and these devices are accessible from anywhere. Hence, wireless sensor network applications are exposed to threats both from the Internet and from within the network. RPL protocol provides new ICMPv6 control messages to exchange routing graph information. RPL protocol uses DIO (DODAG Information Objects) messages to advertise information for building RPL DODAG, and DAO (Destination Advertisem*nt Object) messages are used for supporting downward traffic toward leaf nodes. Nodes send DIO messages periodically, once nodes receive a DIO message, they might use the information to join a new network or update their routing table [6]. Now, the most popular wireless sensor network standard like ZigBee IP supports RPL [15, 16]. ZigBee is a low-cost, low-power, wireless sensor network standard which enable tiny and smart devices to work together for wireless sensor network applications [15]. Therefore, the proposed system will be based on RPL routing protocol. RPL is also vulnerable to wormhole attack. Attackers could send fake ICMPv6 routing packets to construct wormhole tunnel. Khan et al. proposed a Merkle-tree-based authentication to prevent wormhole attack [17]. An added authentication mechanism while maintaining parents within a DODAG can be used for avoiding promotion of routes encompassing malicious nodes sending replay attacks around the surrounding region. However, building Merkle tree needs additional communication and computation resources.

Sensor network applications make use of tiny devices which have limited resources and electricity power. Therefore, additional hardware requirement or complicated detection algorithm is not suitable for detecting wormhole attacks in such environments. In this article, the proposed system is based on RPL without extra hardware or complicated detection algorithm.

3 Proposed system

In this paper, an intrusion detection system to identify wormhole attacks is proposed. To avoid routing loops, RPL calculates the number of hops from a node to the root. “Rank” in RPL represents the position of a node; it increases when the node moves away from the root [5]. The geographic leashes [2] inspired us to use nodes’ location to detect wormhole attacks. Rank is informative to estimate the distance to root node. Therefore, the proposed system applies the rank value to identify suspicious rank values from DIO messages.

To illustrate the idea of the proposed detection method, Figs.3 and 4 give an example of how rank values are changed before and after the wormhole tunnel is established. Figure3 shows the rank value of each node defined by RPL. The root node has the rank of 0, and the rank values represent the number of hops to the root plus one. Figure4 shows the change of the rank values after the malicious nodes, M1 and M2, are deployed and form a wormhole tunnel. When the two nodes are inserted in the network, to update the routing table, the root node sends DIO message to node N1 and M1; the rank of node N1 and M1 is 1. The DIO message will be transmitted accordingly to the following neighbor nodes to update the rank values. It can be seen that the rank value provided by RPL is informative for estimating the distance to the root.

An example of RPL network topology

Full size image

An example of wormhole attack in RPL network

Full size image

The proposed detection method adopts the rank value to identify wormholes. Figure5 illustrates the framework of proposed system. The RPL specification defines four types of control messages for topology maintenance and information exchange. In this paper, DIO messages are first collected by proposed system, and then rank value is extracted from DIO messages. Once DIO messages are extracted, the proposed system will detect if the DIO message is from malicious node or not.

Framework of proposed system

Full size image

The detection algorithm is outlined in Fig.6. As this is a distributed algorithm, each node in the sensor networks examines the features extracted from the packet header to see if a wormhole exists in the network. To shorten the detection process, the malicious nodes are stored in a black list once they have been identified, which will not be examined by the detection system repeatedly. The rank value from the IPv6 header of an incoming traffic is inspected to see if the rank increases gradually or it is different from its neighbors significantly. If the ICMPv6 message is considered as benign, the receivers will update their neighbor table and routing table accordingly.

Process of wormhole detection model

Full size image

This study assumes that when a wireless sensor network exists, no malicious nodes when it is deployed in the beginning. The correct routing table of each node in the newly deployed network will be established before wormhole attack is issued. The proposed detection method defines the following two attributes to discover abnormal DIO messages: Rank_Threshold and Rank_Diff.

Rank_Threshold is defined as the difference of the rank values between its parent and the node itself as formulated in Eq. (1); the attribute value is obtained when the routing table is constructed or updated. For the example illustrated in Fig.3, Rank_Threshold of node N5 is 1 because its rank is 5; that of its parent N4 is 4. Therefore, Rank_Threshold of node N5 is |3 − 4| = 1.

$$ Rank\_ Threshold = \left|(ParentRank)-(SelfRank)\right| $$

(1)

Rank_Diff is defined as the rank difference between the source node and the node itself as expressed in Eq. (2). For the example illustrated in Fig.4, when node N5 receives a new DIO message from malicious node M2, it would compute the Rank_Diff. The Rank_Diff is 4 because the rank value of SourceRank is 1, and rank of node N5 is 5. Therefore, Rank_Diff of node N5 in Fig.4 is |0 − 4| = 4.

$$ Rank\_ Diff=\left|(SourceRank)-(SelfRank)\right| $$

(2)

The proposed system considers a DIO message as malicious when Rank_Diff > Rank_Threshold. In Fig.4, the DIO message sent by node M2 will be identified as malicious by node N5 as Rank_Diff > Rank_Threshold. By applying the proposed system in every node, nodes will ignore any unreasonable DIO messages. Thus, wormhole attack will be prevented. The proposed system is easy to implement and does not need any additional hardware or complex computing.

4 Simulation and results

In this section, we present the simulation environment and results for the proposed approach. The goal of this simulation is to evaluate the performance of the proposed method. For wormhole detection, our system tries to detect malicious DIO messages correctly. Confusion matrix is used as measurements and in shown in Table1. In this section, six different experiments are conducted to evaluate the performance of proposed system in different parameters.

Full size table

This study uses the following performance measurements to evaluate the proposed approach: precision (SP), recall (SR) and accuracy (A). The formulas are expressed as below.

$$ \mathrm{S}\mathrm{P}=\frac{\mathrm{TP}}{\mathrm{TP}+\mathrm{F}\mathrm{P}} $$

(3)

$$ \mathrm{S}\mathrm{R}=\frac{\mathrm{TP}}{\mathrm{TP}+\mathrm{F}\mathrm{N}} $$

(4)

$$ \mathrm{A}=\frac{\mathrm{TN}+\mathrm{T}\mathrm{P}}{\mathrm{TP}+\mathrm{F}\mathrm{N}+\mathrm{F}\mathrm{P}+\mathrm{T}\mathrm{N}} $$

(5)

4.1 Experiment 1

Experiment 1 is used to validate the correctness of proposed approach, and it also describes how all experiments in this research are conducted. In this section, all nodes are deployed by random, the first deployed node is root node. Malicious nodes are deployed after deploying all benign nodes. Table2 illustrates the parameters of this example, and Table3 shows the location (coordinates) of each node.

Full size table
Full size table

After all nodes are deployed, the routing path will be established based on RPL protocol. Figure7 illustrates the topology before wormhole attack of experiment 1.

Topology of experiment 1 before wormhole attack

Full size image

Figure7 shows number of nodes, routing path, and rank value of each node. For example, 9(15) means the ninth node in this experiment and its rank value is 15. After routing path of each node is established, the malicious node 52 and 51 start to spread fake routing message. Figure8 shows the changes of topology after wormhole attack.

Topology of experiment 1 after wormhole attack

Full size image

Node 51 and node 52 first build their wormhole tunnel, and then node 52 replays the router advertisem*nt message from node 52’s parent node (node 29) to its neighbor nodes. Neighbor nodes of node 52 will change their routing path. In this experiment, nodes 3, 7, 9, 11, 14, 15, 18, 31, and 43 change their routing path. The proposed approach could 100% identify the affected and malicious nodes. For example, before wormhole attack, the rank value of node 31 and its parent node (node 14) is 10 and 9, respectively. Therefore, the Rank_Threshold of node 31 is |9 − 10| = 1. After malicious nodes launch wormhole attack, node 31 receives the advertisem*nt message from node 52. The rank value of advertisem*nt message is 6. Therefore, the Rank_Diff of node 31 is |6 − 10| = 4. According to the proposed detection mechanism, if Rank_Diff > Rank_Threshold, the node which sends abnormal advertisem*nt message is malicious. Table4 illustrates the result of experiment 1. True positive (TP) is 9 because all affected nodes could be detected (This also means the proposed system could detect malicious nodes.). True negative (TN) is 41 because there is not any unaffected node to be identified as affected node (This also means there is not any benign node to be identified as malicious node.). Experiment 1 shows that the proposed system could detect malicious nodes and affected nodes without any false negative.

Full size table

Experiment 1 already shows that the proposed system could detect malicious wormhole tunnel. However, applications of wireless sensor networks could be applied to many areas. In this paper, experiments 2 to 5 are conducted to evaluate if the proposed system could detect wormhole attack in different environments and applications.

4.2 Experiment 2

Experiment 2 will evaluate if the proposed system could detect wormhole attack in different map sizes. Table5 illustrates the parameters in experiment 2, and Table6 shows the result of experiment 2.

Full size table
Full size table

The result of experiment 2 shows that the proposed system could detect wormhole attack perfectly in different map sizes without any false negative. This is a very important feature because nodes of wireless sensor network could be deployed in a small area like a house or be deployed in a large area like a farm. The proposed system is suitable for various wireless sensor network applications.

4.3 Experiment 3

Experiment 3 evaluates if the number of benign nodes affects the detection performance or not. Table7 presents the parameters of experiment 3, and Table8 shows the results.

Full size table
Full size table

The results of experiment 3 show that the number of benign nodes does not affect the detection performance. The number of nodes in a sensor network may vary in different applications and applied environments. Some applications such as smart homes need few nodes, and some networks such as VANETs (Vehicular Ad Hoc Networks) involve a lot of nodes. Detection mechanisms [14] relying on neighbor node information may not be able to detect wormholes if there are not enough nodes in the environment. The results show that the proposed system could detect wormholes in various network environments ranging from a small to large amount of nodes.

4.4 Experiment 4

Experiment 4 tests if communication range of nodes will affect the detection performance of proposed system. Nodes with longer communication range mean more neighbor nodes and complex routing tables. Different wireless sensor network applications need different communication ranges. In Zigbee’s specification, communication range of Zigbee devices are from 50 to 300m. Table9 illustrates the parameters in experiment 4, and Table10 shows the result of experiment 4.

Full size table
Full size table

The result of experiment 4 shows that communication range of benign nodes would not affect the detection performance of proposed system. Communication range of nodes varies with applications. Some applications like smart home need only shorter communication range, and some network like VANETs (Vehicular Ad Hoc Networks) need longer communication range (like 100m or longer). The result shows that the proposed system could detect wormhole in different wireless sensor network applications.

4.5 Experiment 5

In experiment 5, we evaluate the relation between the distance of wormhole tunnel and the performance of our approach. Distance of wormhole tunnel always longer than communication range of benign nodes. If distance of wormhole tunnel is shorter than communication range of benign nodes, malicious nodes will never attract any traffic. However, some detection mechanisms use transmission time to estimate transmission distance nodes [4]. If the length of wormhole is short, such detection mechanism may not work. Table11 illustrates the parameters in experiment 5, and Table12 shows the result of experiment 5.

Full size table
Full size table

The result indicates that the proposed system will detect wormhole attacks with different distances of wormhole tunnel.

The results of experiments 1 to 5 show that proposed system could detect wormhole attack well in different situations. The proposed system is a location-based detection system. Although each node could not know their exact location, the relative location will be get based on rank value in RPL routing protocol. Any malicious DIO messages will be ignored due to unreasonable rank value. The proposed approach does not need any additional devices like GPS or complex algorithm to compute location of nodes. Some approaches like temporal leashes which used transmission time to estimate transmission distance nodes [4]; Wired Equivalent Privacy (WEP) which monitor network traffic of neighbor nodes to detect wormhole [14]. In this paper, we implement temporal leashes and WEP as benchmark of proposed system. Experiment 6 evaluates the detection performance based on different rain fade. Table13 illustrates the parameters in experiment 6, and Table14 shows the result of experiment 6.

Full size table
Full size table

Result of experiment 5 shows that the proposed system and WEP could detect wormhole perfect in different rain fade levels. Detection accuracy of packet leashes will vary by rain fade because some benign nodes are identified as malicious due to Network latency. Packet leashes approach used transmission time to estimate transmission distance. But packet leashes did not consider that network latency could result in longer transmission time. Once Network transmission is unstable, benign nodes would be identified as malicious nodes.

Number of benign nodes is also a very important parameter to evaluate a detection mechanism of wormhole. Some detection approaches need neighbor nodes’ information to detect wormhole attack. Table15 illustrates the parameters in experiment 7, and Table16 shows the result of experiment 7.

Full size table
Full size table

The result of experiment 7 indicates that WAP will have low accuracy when few nodes are deployed. WAP analyzed neighbor nodes’ traffic, if there are enough neighbor nodes, WAP could not get enough information to detect wormhole well. According to experiments 6 and 7, the results show the proposed system outperform WAP and packet leashes. Our system could apply to most wireless sensor network applications without additional hardware. The results of experiments 1 to 7 show that the proposed system could 100% detect wormhole. Compared with traditional wormhole detection approach, the proposed system has higher accuracy rate. Moreover, the proposed system does not need any additional hardware or special nodes. The experiments show the proposed system is a good security mobility management mechanism for wireless sensor network.

5 Conclusions

Wireless sensor network or IoT will be the trend, and more and more wireless sensor network applications have been developed in the world. Due to the nature of wireless sensor network, the devices have only limited computing and electricity capability. Thus, wormhole detection in wireless sensor networks becomes a challenge. This study proposes a wormhole detection mechanism based on RPL routing protocol without additional hardware requirement. The simulation results show the proposed system could detect wormhole correctly. The proposed detection system focuses on the availability of IPv6 wireless sensor network. However, confidentiality is also important for the application of wireless sensor network. Malicious nodes can make fake DIO messages to evade detection. Wireless sensor network applications might apply IPSec technology like IPsec-for-6LoWPAN to ensure the confidentiality and integrity of wireless sensor network applications. The proposed detection system could be a good security mobility management mechanism for wireless sensor network because (1) the proposed system has 100% accuracy; (2) the proposed system does not need any special hardware or special nodes; (3) the proposed system could be applied in any environment; the proposed system needs only few computing resources.

References

  1. M Ali, T Suleman, ZA Uzmi. “MMAC: A mobility-adaptive, collision-free mac protocol for wireless sensor networks,” in Performance, Computing, and Communications Conference, 2005. IPCCC 2005. (24th IEEE International, Phoenix, 2005), pp. 401-407

  2. L Hu, D Evans. “Using Directional Antennas to Prevent Wormhole Attacks,” in NDSS, (San Diego, 2004)

  3. Y-C Hu, A Perrig, DB Johnson. “Packet leashes: a defense against wormhole attacks in wireless networks,” in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. (IEEE Societies, San Francisco, 2003), pp. 1976-1986

  4. Y-C Hu, A Perrig, DB Johnson, “Wormhole attacks in wireless networks,” Selected Areas in Communications. IEEE J 24, 370–380 (2006)

    Google Scholar

  5. T Tsvetkov, RPL: IPv6 routing protocol for low power and lossy networks. Sens Nodes Oper Netw Appl 59, 2 (2011)

    Google Scholar

  6. T Winter, “RPL: IPv6 routing protocol for low-power and lossy networks“. 2012

  7. L Wallgren, S Raza, T Voigt. “Routing Attacks and Countermeasures in the RPL-based Internet of Things,” International Journal of Distributed Sensor Networks, vol. 2013, 2013. http://dsn.sagepub.com/content/9/8/794326.full

  8. O Garcia-Morchon, S Kumar, R Struik, S Keoh, R Hummen, Security Considerations in the IP-based Internet of Things, 2013

    Google Scholar

  9. I Khalil, S Bagchi, NB Shroff, MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw 6, 344–362 (2008)

    Article Google Scholar

  10. R Poovendran, L Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw 13, 27–59 (2007)

    Article Google Scholar

  11. K Sanzgiri, B Dahill, BN Levine, C Shields, EMB Royer. “A secure routing protocol for ad hoc networks,” in Network Protocols, 2002. Proceedings. 10th IEEE International Conference on, Paris, 2002, pp. 78-87

  12. P Papadimitratos, ZJ Haas, Secure Routing for Mobile Ad Hoc Networks (the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, 2002), pp. 193–204

    Google Scholar

  13. I Khalil, S Bagchi, NB Shroff. “LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks,” in Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, Yokohama, 2005, pp. 612-621

  14. S Choi, D-y Kim, D-h Lee, J-i Jung. “WAP: Wormhole attack prevention algorithm in mobile ad hoc networks,” in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC’08. (IEEE International Conference, Taichung, 2008), pp. 343-348

  15. Wikipedia contributors. (3 February 2016 16:09 UTC). ZigBee. Available: https://en.wikipedia.org/w/index.php?title=ZigBee&oldid=702729380. Accessed 23 Feb 2016

  16. ZigBee. (2015). The ZigBee Alliance. Available: http://www.zigbee.org/. Accessed 23 Feb 2016

  17. FI Khan, T Shon, T Lee, K Kim. “Wormhole attack prevention mechanism for RPL based LLN network,” in Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on, Da Nang, 2013, pp. 149-154

Download references

Acknowledgments

This work is supported in part by the Ministry of Science and Technology, Taiwan, Republic of China, under Grants MOST 105-2221-E-034 -011 -MY2.

Competing interests

The author declares that he/she has no competing interests.

Author information

Authors and Affiliations

  1. Department of Information Management, Chinese Culture University, Taipei, Taiwan

    Gu-Hsin Lai

Authors

  1. Gu-Hsin Lai

    You can also search for this author in PubMedGoogle Scholar

Corresponding author

Correspondence to Gu-Hsin Lai.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Detection of wormhole attacks on IPv6 mobility-based wireless sensor network (9)

Cite this article

Lai, GH. Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. J Wireless Com Network 2016, 274 (2016). https://doi.org/10.1186/s13638-016-0776-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-016-0776-0

Keywords

  • Wormhole attack
  • Sensor networks
  • IPv6
  • RPL
  • Mobility
Detection of wormhole attacks on IPv6 mobility-based wireless sensor network (2024)

FAQs

What is wormhole attacks in wireless networks? ›

Wormhole attack is a grave attack in which two attackers locate themselves strategically in the network. Then the attackers keep on listening to the network, and record the wireless information.

What are two consequences of wormhole attacks on the IOT network? ›

The Wormhole attack impacts the confidentiality, availability and integrity of the data in the WSN, which could affect part or all of the network.

What are the challenges on detection of WSN attacks? ›

Security, privacy, computation and energy constraints, and reliability issues are the major challenges facing WSNs, especially during routing. To solve these challenges, WSN routing protocols must ensure confidentiality, integrity, privacy preservation, and reliability in the network.

What is the difference between a wormhole and a black hole attack? ›

The major distinction between a wormhole and a black hole is that a wormhole is a funnel-shaped space-time tunnel between two points between universes, whereas a black hole is a cosmic body with extreme gravity from which nothing can escape.

How do you detect wormholes? ›

There are three methods that can possibly detect wormholes: Negative Temperature, Hawking/ Phantom Radiation, and Kα iron emission lines. This paper discusses whether or not any of these three methods are useful ways to detect wormholes with today's technology and if so, which one is the best and which is the worst.

What are the methods of wormhole detection? ›

They used two parameters RTT and PFR for the detection of a malicious node. PFR (Packet Forward Ratio) less than one and RTT less than the pre-calculated threshold determine the existence of wormhole nodes in the network. This technique is simple and free from the extra cost of additional resources.

What would cause a wormhole? ›

Imagine space as a curved two-dimensional plane. Wormholes like this could form when two masses apply enough force on space-time to create a tunnel connecting distant points. Theoretical Kerr black holes aren't the only possible cosmic shortcut to the past or future.

What can hackers do with IoT devices? ›

Botnets: Hackers can take control of many IoT devices, including washing machines, to create groups of hacked devices called botnets. These networks of compromised devices can be used to launch large-scale DDoS attacks or distribute malware. Data Theft: IoT devices may store personal information or credentials.

How can a wormhole be destroyed? ›

If you were to find a wormhole and send a single bit of light - a single photon - down the tunnel, the reaction of that photon's energy to the space-time around it would be enough to completely destroy the wormhole faster than the speed of light.

What are the methods to minimize attacks in WSN? ›

The cluster key session key and the pair wise key are changed. Filters are used to send the key to cluster members which will filter the malicious node. New routes are built to CH. This mechanism reduces the loss of packets as the number of malicious nodes increases.

What are the disadvantages of wireless sensor networks? ›

Disadvantage of WSN:
  • It cannot be used in high speed communication as it is designed for low speed application.
  • It is quite expensive to build such network, so cost-effectiveness of such system may be a concern for some users.
  • WSN has limited computation and communication resources. It is prone to security threat.

Which security attacks are related to WSN protocols? ›

Blackhole attack – The security attacks in WSN in which the black hole attack has two distinct characteristics. The malicious node act as a black hole when the packets pass through these black holes, then the attacker can manipulate the data.

What are the 3 types of wormholes? ›

1) Traversable wormholes are wormholes that can be traveled through. 2) Non-traversable wormholes are wormholes that cannot be traveled through. 3) One-way wormholes are wormholes you can only travel through once.

How does wormhole attack work? ›

A wormhole attack is a passive attack that creates a separate unauthorized link between two communicating nodes, subsequently causing the legitimate nodes to send data through this link. Thus, the data are intercepted, and the corresponding nodes are compromised.

What are the two types of wormholes? ›

There are two main types of wormhole of interest to physicists: Lorentzian wormholes (general relativity) and Euclidean wormholes (particle physics). Lorentzian wormholes are essentially short-cuts through space and time.

What is wormhole with example? ›

A wormhole is like a tunnel between two distant points in our universe that cuts the travel time from one point to the other. Instead of traveling for many millions of years from one galaxy to another, under the right conditions one could theoretically use a wormhole to cut the travel time down to hours or minutes.

What are four 4 common attacks on Wi-Fi? ›

Here are some of the common types of wireless network attacks:
  • Wireless Eavesdropping (Passive Attacks) ...
  • Wireless Spoofing (Man-in-the-Middle Attacks) ...
  • Wireless Jamming (Denial-of-Service Attacks) ...
  • Rogue Access Points. ...
  • Brute-Force Attacks. ...
  • WEP/WPA Cracking. ...
  • Evil Twin Attacks. ...
  • Deauthentication/Disassociation Attacks.

What are the top 3 wireless network attacks? ›

Fake WiFi Access Points, Evil Twins, and Man in the Middle Attacks.

Top Articles
What Are the 8 Core Functions of EHRs?
6 Rules of Investing in Crypto
Beacon Schnider
Craigslist Kennewick Pasco Richland
Tribune Seymour
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Remnant Graveyard Elf
Craigslist Pets Sac
Los Angeles Craigs List
Mini Handy 2024: Die besten Mini Smartphones | Purdroid.de
Best Forensic Pathology Careers + Salary Outlook | HealthGrad
Pekin Soccer Tournament
3S Bivy Cover 2D Gen
Ms Rabbit 305
Msu 247 Football
Saritaprivate
Tinker Repo
Isaidup
Mj Nails Derby Ct
R. Kelly Net Worth 2024: The King Of R&B's Rise And Fall
The Listings Project New York
Weve Got You Surrounded Meme
Craigslist Alo
Aliciabibs
Colonial Executive Park - CRE Consultants
Jcp Meevo Com
Bolsa Feels Bad For Sancho's Loss.
Workshops - Canadian Dam Association (CDA-ACB)
55Th And Kedzie Elite Staffing
Pronóstico del tiempo de 10 días para San Josecito, Provincia de San José, Costa Rica - The Weather Channel | weather.com
Speechwire Login
What is Software Defined Networking (SDN)? - GeeksforGeeks
Little Einsteins Transcript
Darktide Terrifying Barrage
Missing 2023 Showtimes Near Grand Theatres - Bismarck
Frostbite Blaster
11 Pm Pst
4083519708
Metro By T Mobile Sign In
Midsouthshooters Supply
Craigslist Summersville West Virginia
Tirage Rapid Georgia
Bones And All Showtimes Near Johnstown Movieplex
Blackwolf Run Pro Shop
COVID-19/Coronavirus Assistance Programs | FindHelp.org
Gon Deer Forum
Best Suv In 2010
Mail2World Sign Up
Ciara Rose Scalia-Hirschman
Subdomain Finer
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 6240

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.