Department Of Computer Engineering - Dezful Branch of Azad University, Khuzestan, Iran
Abstract
Today, wireless sensor networks are exposed to dangerous attacks that can disrupt the network. One of these malicious attacks is wormhole and black hole attacks which can pose serious threats to the network. Timely detection and detection of these attacks can improve network performance. In this research, a method is provided to improve, identify, detect and deal with wormhole and black hole attacks. The proposed method is a combination of two methods based on RTT and end-to-end identification method. In wireless sensor networks, when a wormhole attack occurs, it is natural that the number of node neighbors will be higher than usual; So we use this information to identify and attack wormholes. The results of this study indicate an improvement in the detection and response of attacks so that in sections, the average rate of packets received, the number of RREQs accepted at the destination, comparison of average energy consumption, node removal rate and system overhead can achieve acceptable performance compared to others. Acquired existing methods.
Kaliyar, W. B. Jaballah, M. Conti, & C. Lal, “LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks”, Computers & Security, Vol. 94, 2020.##
Gomathy, V., Padhy, N., Samanta, D., Sivaram, M., Jain, V., & Amiri, I. S. “Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks”, Journal of Ambient Intelligence and Humanized Computing, 11, no. 11, pp. 4995-5001, 2020.##
Sankara Narayanan, & G. Murugaboopathi, “Modified secure AODV protocol to prevent wormhole attack in MANET”, Concurrency and Computation: Practice and Experience, Vol. 32, no. 4, p. 5017, 2020.##
Tamilarasi, & S. G. Santhi, “Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network”, Wireless Personal Communications, Vol. 114, no. 1, pp. 329-345, 2020.##
Sharma, M. Sharma, & D. P. Sharma, “A Trust based Scheme for Spotting Malicious Node of Wormhole in Dynamic Source Routing Protocol”, In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) pp. 1232-1237, IEEE, 2020.##
K. Roy, & A. K. Khan, “RTT based wormhole detection for wireless mesh networks”, International Journal of Information Technology, Vol. 12, no. 2, pp. 539-546, 2020.##
Ghugar, & J. Pradhan, “Survey of wormhole attack in wireless sensor networks”, Computer Science and Information Technologies, Vol. 2, no. 1, pp. 33-42, 2021.##
Almheiri, T. Hartman, J. Maldacena, E. Shaghoulian, & A. Tajdini, “Replica wormholes and the entropy of Hawking radiation”, Journal of High Energy Physics, Vol. 5, pp. 1-42, 2020.##
B. Giddings, & G. J. Turiaci, “Wormhole calculus, replicas, and entropies”, Journal of High Energy Physics, Vol. 9, pp. 1-18, 2020.##
Chen, X. L. Qi, & P. Zhang, “Replica wormhole and information retrieval in the SYK model coupled to Majorana chains”, Journal of High Energy Physics, Vol. 6, 1-26, 2020.##
Jusufi, P. Channuie, & M. Jamil, “Traversable wormholes supported by GUP corrected Casimir energy”, The European Physical Journal C, Vol. 80, no. 2, pp. 1-14, 2020.##
Antoniou, A. Bakopoulos, P. Kanti, B. Kleihaus, & J. Kunz, “Novel Einstein–scalar-Gauss-Bonnet wormholes without exotic matter”, Physical Review D, Vol. 101, no. 2, p. 024033, 2020.##
R. Ahutu, & H. El-Ocla, “Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks. IEEE Access, Vol. 8, pp. 63270-63282, 2020.##
Bhawsar, Y. Pandey, & U. Singh, “Detection and Prevention of Wormhole Attack using the Trust-based Routing System”, In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) (pp. 809-814), IEEE, 2020.##
Jamali, & R. Fotohi, “Defending against wormhole attack in MANET using an artificial immune system”, New Review of Information Networking, Vol. 21, no. 2, pp. 79-100, 2016.##
Govindasamy, & S. Punniakody, “A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack”, Journal of Electrical Systems and Information Technology, Vol. 5, no. 3, pp. 735-744, 2018.##
B. Aswale, & R. D. Joshi, “Security Enhancement by Preventing Wormhole Attack in MANET”, In Innovations in Electronics and Communication Engineering, pp. 225-237, Springer, Singapore, 2020.##
Kaur, D. Kaur, & R. Mahajan, “Wormhole attack detection technique in mobile ad hoc networks”, Wireless Personal Communications, Vol. 97, no. 2, pp. 2939-2950, 2017.##
Samuel, B. M. Alvarez, E. G. Ribera, P. P. Ioulianou, & V. G. Vassilakis, “Performance evaluation of a wormhole detection method using round-trip times and hop counts in RPL-based 6LoWPAN networks”, In 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 1-6, IEEE, 2020.##
Majumder, & D. Bhattacharyya, “Relation estimation of packets dropped by wormhole attack to packets sent using regression analysis”, In Emerging Technology in Modelling and Graphics, pp. 557-566, Springer, Singapore, 2020.##