The Wormhole Routing Attack in Wireless Sensor Networks (WSN)


Lukman Sharif, Munir Ahmed, Journal of Information Processing Systems Vol. 6, No. 2, pp. 177-184, Apr. 2010  

10.3745/JIPS.2010.6.2.177
Keywords: Secure routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack
Fulltext:

Abstract

Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Lukman Sharif and Munir Ahmed (2010). The Wormhole Routing Attack in Wireless Sensor Networks (WSN). Journal of Information Processing Systems, 6(2), 177-184. DOI: 10.3745/JIPS.2010.6.2.177.

[IEEE Style]
L. Sharif and M. Ahmed, "The Wormhole Routing Attack in Wireless Sensor Networks (WSN)," Journal of Information Processing Systems, vol. 6, no. 2, pp. 177-184, 2010. DOI: 10.3745/JIPS.2010.6.2.177.

[ACM Style]
Lukman Sharif and Munir Ahmed. 2010. The Wormhole Routing Attack in Wireless Sensor Networks (WSN). Journal of Information Processing Systems, 6, 2, (2010), 177-184. DOI: 10.3745/JIPS.2010.6.2.177.