Abstract
One of the most dangerous threats to Wireless Sensor Networks (WSN) are wormhole attacks, due to their capacity to manipulate routing and application data in real time and cause important damages to the integrity, availability, and confidentiality of network data. An empirical method to launch a successful attack on IEEE 802.15.4/Zigbee devices with source routing enabled is adopted in this work to find signatures for detecting wormhole attacks in real environments. It uses the KillerBee framework with algorithms for packet manipulation through a malicious node to capture and inject malicious packets in victim nodes. Besides, a reverse variant of wormhole attack is presented and executed. To evidence the realization of this threat by the attacking software, the experimental framework includes XBee S2C nodes. The results include recommendations, detection signatures and future work to face wormhole attacks involving source routing protocols like DSR.
Publisher
Universidad Autonoma de Bucaramanga
Reference24 articles.
1. Amish, P., & Vaghela, V. B. (2016). Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol. Procedia Computer Science, 79, 700-707. https://doi.org/10.1016/j.procs.2016.03.092
2. Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., & Qureshi, K. N. (2014). Security Issues and Attacks in Wireless Sensor Network. World Applied Sciences Journal, 30(10), 1224-1227. https://doi.org/10.5829/idosi.wasj.2014.30.10.334
3. Bhagat, S., & Panse, T. (2016). A detection and prevention of wormhole attack in homogeneous Wireless sensor Network. In 2016 International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1-6). IEEE. https://doi.org/10.1109/ICTBIG.2016.7892696
4. Introduction to Wireless Sensor Networks;Forster;John Wiley & Sons,2016
5. Gaware, A., & Dhonde, S. B. (2016). A Survey on Security Attacks in Wireless Sensor Networks. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 536-539).
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献