Protecting Source Location Privacy against Wormhole Attack Using Dawn in Wireless Sensor Networks
نویسندگان
چکیده
As sensor-driven applications become progressively more integrated into our lives; issues linked to sensor privacy will become increasingly important. In wireless sensor networks, adversaries can make use of the traffic information for locating the monitored objects. Network coding has been shown to be an efficient approach to improve the wireless system performance. In a wormhole attack, the attacker can forward each packet using wormhole links and without modifies the packet transmission by routing it to an unauthorized remote node and pose a severe threat to many functions in the network, such as routing and localization. We developed a wormhole attack and are prevented by DAWN (Distributed detection Algorithm against Wormhole attack in wireless Network coding systems) algorithm using hash operation in cryptosystems. Simulation and methodical results reveal that our scheme acquires low energy consumption and less false positive rate than hotspot attack.
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملAll-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks
Wireless sensor networks are deployed to monitor the surrounding physical environments and they also act as the physical environments of parasitic sensor networks, whose purpose is analyzing the contextual privacy and obtaining valuable information from the original wireless sensor networks. Recently, contextual privacy issues associated with wireless communication in open spaces have not been ...
متن کاملWormhole Attack in Wireless Sensor Network
In multi hop wireless systems, such as wireless sensor networks, mobile ad hoc network, security is an important factor. It becomes more critical issue when we transmit important data between nodes. There are a lot of attacks available in wireless sensor network or mobile ad hoc network. In our paper we are going to discuss about a particularly devastating attack, known as the wormhole attack. ...
متن کاملSink Location Service Based on Fano Plane in Wireless Sensor Networks
Sink location is considered as a basic service in geographic routing in wireless sensor networks. Obtaining the location of sink node by source node using an efficient method with low complexity has always been a challenging issue in research. In this paper, a sink location algorithm based on Fano plane is proposed. The research challenge is how to ensure the intersection of two SLQ (Location Q...
متن کاملPreventing Attacks from Eavesdropper Using HMAC Protocol in Wireless Sensor Networks
A wireless sensor network (WSN) is composed of numerous small sensing devices with limited communication range. The sensors collect data from the environment and report them to the sinks. With the promising sensing and wireless technologies, sensor networks are expected to be widely deployed in a broad spectrum of civil and military applications. Location information of the sinks, the sensors, ...
متن کامل