CFP last date
01 January 2025
Reseach Article

GRPW-MuS-s: A Secure Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks

by Yassine Sabri, Najib El Kamoun
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 5
Year of Publication: 2016
Authors: Yassine Sabri, Najib El Kamoun
10.5120/cae2016652472

Yassine Sabri, Najib El Kamoun . GRPW-MuS-s: A Secure Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks. Communications on Applied Electronics. 6, 5 ( Dec 2016), 1-7. DOI=10.5120/cae2016652472

@article{ 10.5120/cae2016652472,
author = { Yassine Sabri, Najib El Kamoun },
title = { GRPW-MuS-s: A Secure Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks },
journal = { Communications on Applied Electronics },
issue_date = { Dec 2016 },
volume = { 6 },
number = { 5 },
month = { Dec },
year = { 2016 },
issn = { 2394-4714 },
pages = { 1-7 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume6/number5/690-2016652472/ },
doi = { 10.5120/cae2016652472 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:56:11.439847+05:30
%A Yassine Sabri
%A Najib El Kamoun
%T GRPW-MuS-s: A Secure Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks
%J Communications on Applied Electronics
%@ 2394-4714
%V 6
%N 5
%P 1-7
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

GRPW-MuS (Geographic Routing to Multiple Sinks in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks inWireless Sensor Networks . GRPW-MuS, a geographical routing protocol for wireless sensor networks , is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce the number of topology broadcast. GRPW-MuS uses periodic HELLO packets to neighbor detection. As introduced in Reference [9, 17], the wormhole attack can form a serious threat in wireless sensor networks, especially against many wireless sensor networks routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in GRPW-MuS is provided called GRPW-MuS-s . Using OMNET++ simulation and the MiXiM framework, results show that GRPW-MuS-s protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than GRPW-MuS). The average energy usage at each node for GRPW-MuS-s protocol during the neighbor discovery and route discovery is very low than GRPW-MuS, which is much lower than the available energy at each node. The cost analysis shows that GRPW-MuS-s protocol only needs small memory usage at each node , which is suitable for the sensor network.

References
  1. Tarik Arici, Toygar Akgun, and Yucel Altunbasak. A prediction error-based hypothesis testing method for sensor data acquisition. ACM Trans. Sen. Netw., 2(4):529–556, November 2006.
  2. Marcello Cinque, Antonio Coronato, Alessandro Testa, and Catello Di Martino. A survey on resiliency assessment techniques for wireless sensor networks. In Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access, MobiWac ’13, pages 73–80, New York, NY, USA, 2013. ACM.
  3. Gabriel Martins Dias, Boris Bellalta, and Simon Oechsner. A survey about prediction-based data reduction in wireless sensor networks. ACM Comput. Surv., 49(3):58:1–58:35, November 2016.
  4. Tassos Dimitriou and Athanassios Giannetsos. Wormholes no more? localized wormhole detection and prevention in wireless networks. In Proceedings of the 6th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS’10, pages 334–347, Berlin, Heidelberg, 2010. Springer-Verlag.
  5. Tassos Dimitriou and Athanassios Giannetsos. Wormholes no more? localized wormhole detection and prevention in wireless networks. In Proceedings of the 6th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS’10, pages 334–347, Berlin, Heidelberg, 2010. Springer-Verlag.
  6. Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, and Xiangke Liao. Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Trans. Netw., 19(6):1787–1796, December 2011.
  7. Mohammad Hammoudeh. Applying wireless sensor networks to solve real-world problems. In Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication, IPAC ’15, pages 1:1–1:1, New York, NY, USA, 2015. ACM.
  8. Kamal S. Hamza and Fathy Amir. Centralized clustering evolutionary algorithms for wireless sensor networks. In Proceedings of the 10th International Conference on Informatics and Systems, INFOS ’16, pages 273–277, New York, NY, USA, 2016. ACM.
  9. Sunil Kumar Jangir and Naveen Hemrajani. Evaluation of black hole, wormhole and sybil attacks in mobile ad-hoc networks. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS ’16, pages 74:1–74:6, New York, NY, USA, 2016. ACM.
  10. Marek Klonowski and MichaB Koza. Countermeasures against sybil attacks in wsn based on proofs-of-work. In Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ’13, pages 179–184, New York, NY, USA, 2013. ACM.
  11. A. K¨opke, M. Swigulski, K. Wessel, D. Willkomm, P. T. Klein Haneveld, T. E. V. Parker, O. W. Visser, H. S. Lichte, and S. Valentin. Simulating wireless and mobile networks in omnet++ the mixim vision. In Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, pages 71:1–71:8, ICST, Brussels, Belgium, Belgium, 2008. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications E
  12. Konrad-Felix Krentz and Gerhard Wunder. 6lowpan security: Avoiding hidden wormholes using channel reciprocity. In Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED ’14, pages 13–22, New York, NY, USA, 2014. ACM.
  13. Abdelkader Laouid, Mohamed-Lamine Messai, Ahc`ene Bounceur, Reinhardt Euler, Abdelnasser Dahmani, and Abdelkamel Tari. A dynamic and distributed key management scheme for wireless sensor networks. In Proceedings of the International Conference on Internet of Things and Cloud Computing, ICC ’16, pages 70:1–70:6, New York, NY, USA, 2016. ACM.
  14. Stephen Paul Marsh. Formalising trust as a computational concept. Technical report, 1994.
  15. Takashi Minohara and Kyosuke Nishiyama. Poster: Detection of wormhole attack on wireless sensor networks in duty-cycling operation. In Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks, EWSN ’16, pages 281–282, USA, 2016. Junction Publishing.
  16. Fihri Mohammed, El Fatimi Youssef, Hnini Abedehalim, and Ezzati Abdellah. Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in wsn. In Proceedings of the International Conference on Internet of Things and Cloud Computing, ICC ’16, pages 78:1–78:4, New York, NY, USA, 2016. ACM.
  17. Richa Mudgal and Rohit Gupta. An efficient approach for wormhole detection in manet. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS ’16, pages 29:1–29:6, New York, NY, USA, 2016. ACM.
  18. Ibrihich Ouafaa, Laassiri Jalal, Krit Salah-ddine, and El Hajji Said. The comparison study of hierarchical routing protocols for ad-hoc and wireless sensor networks: A literature survey. In Proceedings of the The International Conference on Engineering & MIS 2015, ICEMIS ’15, pages 32:1–32:8, New York, NY, USA, 2015. ACM.
  19. Yassine Sabri and Najib El Kamoun. Geographic routing in wireless sensor networks based on a partitioned architecture. International Journal of Computer Applications, 153(5):1–8, Nov 2016.
  20. H. Sarbazi-Azad and M. Ould-Khaoua. A simple mathematical model of adaptive routing in wormhole k-ary ncubes. In Proceedings of the 2002 ACM Symposium on Applied Computing, SAC ’02, pages 835–839, New York, NY, USA, 2002. ACM.
  21. Marcelo P. Sousa, Ajey Kumar, Marcelo S. Alencar, and Waslon T.A. Lopes. Performance evaluation of a selective cooperative scheme for wireless sensor networks. In Proceedings of the 6th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, PE-WASUN ’09, pages 85–92, New York, NY, USA, 2009. ACM.
  22. Yanqiang Sun, XiaodongWang, and Xingming Zhou. Jamming attack in wsn: A spatial perspective. In Proceedings of the 13th International Conference on Ubiquitous Computing, UbiComp ’11, pages 563–564, New York, NY, USA, 2011. ACM.
  23. Kun-Lin Tsai, MengYuan Ye, and Fang-Yie Leu. Secure power management scheme for wsn. In Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST ’15, pages 63–66, New York, NY, USA, 2015. ACM.
  24. R. Annie Uthra and S. V. Kasmir Raja. Qos routing in wireless sensor networks—a survey. ACM Comput. Surv., 45(1):9:1–9:12, December 2012.
  25. Andr´as Varga and Rudolf Hornig. An overview of the omnet++ simulation environment. In Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, pages 60:1–60:10, ICST, Brussels, Belgium, Belgium, 2008. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
  26. Weichao Wang and Bharat Bhargava. Visualization of wormholes in sensor networks. In Proceedings of the 3rd ACM Workshop on Wireless Security, WiSe ’04, pages 51– 60, New York, NY, USA, 2004. ACM.
  27. Yurong Xu, Yi Ouyang, Zhengyi Le, James Ford, and Fillia Makedon. Analysis of range-free anchor-free localization in a wsn under wormhole attack. In Proceedings of the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems, MSWiM ’07, pages 344– 351, New York, NY, USA, 2007. ACM.
  28. Lin Yao, Lin Kang, Pengfei Shang, and Guowei Wu. Protecting the sink location privacy in wireless sensor networks. Personal Ubiquitous Comput., 17(5):883–893, June 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (WSN) Routing Multiple Sink Localization Geographic Routing