Indonesian Journal of Electrical Engineering and Computer Science V ol. 5, No . 1, J an uar y 2017, pp . 147 158 DOI: 10.11591/ijeecs .v5.i1.pp147-158 147 Attac ks and Secure Geographic Routing in Wireless Sensor Netw orks Y assine Sabri* and Najib El Kamoun Chouaib Doukkali Univ ersity , B .P: 20 . El J adida Morocco *Corresponding author , e-mail: sabr iy assino@gmail.com Abstract Due to open netw or k nature of wireless sensor netw or ks mak e them highly vulner ab le to a v ar iety of secur ity attac ks and easy target f or adv ersar ies , which ma y capture these nodes , analyz e and easily inser t f ak e route inf or mation. Wireless sensor netw or k is an emerging, cost eff ectiv e and unsuper vised solu tion f or collecting this inf or mation from the ph ysical w or ld and sending this inf or mation bac k to centr aliz ed author ity f or fur ther processing. GRPW (Geog r aphic Routing in connected wireless sensor netw or ks based on Multiple Sinks) is one of the basic routing protocols used f or Suppor ting Mobile Sinks in Wireless Sensor Netw or ks . GRPW , a geog r aphical routing protocol f or wireless sensor netw or ks , is based on an architecture par titioned b y logical le v els , on the othe r hand based on a m ultipoint rela ying flooding technique to reduce the n umber of topology broadcast. GRPW -MuS uses per iodic HELLO pac k ets to neighbor detection. As introduced in Ref erence [1, 2], the w or mhole attac k can f or m a ser ious threat in wi reless sensor netw or ks , especially against man y wireless sensor netw or ks routing protocols and location-based wireless secur ity systems . Here , a tr ust model to handle this attac k in GRPW is pro vide d called GRPW -MuS-s . Using OMNET++ sim ulation and the MiXiM fr ame w or k, results sho w that GRPW -MuS-s pro tocol only has v er y small f alse positiv es f or w or mhole detection dur ing the neighbor disco v er y process (less than GRPW). The a v er age energy usage at e ach node f or GRPW -MuS-s protocol dur ing the neighbor disco v er y and route disco v er y is v er y lo w than GRPW -MuS , which is m uch lo w er than the a v ailab le energy at each node . The cost analysis sho ws that GRPW -MuS-s protocol only needs small memor y usage at each node , which is suitab le f or the sensor netw or k. K e yw or ds: Wireless Sensor Netw or k (WSN), Routing, Secur ity , W or mhole attac k Cop yright c 2017 Institute of Ad v anced Engineering and Science . All rights reser ved. 1. Intr oduction Man y sensor netw or k applications , such as emergency response oper ations in a disaster en vironment or battlefield monitor ing, that r un in untr ustw or th y en vironments , require secure com- m unication and routing [3–5] to saf eguard against diff erent types of att ac ks . The attac ks such as b lac khole , w or mhole , misdirection, and rep la y [6, 7] can cause an e xisting route to be brok en or a ne w route to be pre v ented from being estab lished [8, 9]. There are se v er al e xamples of attac ks against routing in sensor netw or ks; a routing pac k et could be captu red and the inf or mation in the pac k et could be tampered with, or the adv ersar y might inser t a spur ious message in the sensor netw or k. T r aditional secur ity protocols are designed f or resource r ich machines to suppor t large computation and are not applicab le to sensor netw or ks due to resource limitations , ad hoc nature , and inter mittent connectivity . Man y sensor netw or k routi ng protocols ha v e been proposed, b ut v er y f e w of them ha v e been designed with secure routing as a goal. Secure routing protocols in sensor n etw or ks present challenges , which do not e xist in tr aditional netw or ks , such as no centr ally administered routers , lo w po w er , and small memor y nodes . A w or mhole is a tunnel which connects tw o remote nodes . In a w or mhole attac k [10], an attac k er receiv es pac k ets at one location in the netw or k, tunnels them to a remote location in the netw or k, an d t hen repla ys t hem into the netw or k from that location. A w or mhole attac k can be easily e x ecuted against routing in sensor netw or ks because it does not need to ph ysically compromise an y sensor node . Thu s , a w or mhole attac k poses a ser ious threat against routing in Receiv ed No v ember 12, 2016; Re vised December 19, 2016; Accepted December 30, 2016 Evaluation Warning : The document was created with Spire.PDF for Python.
148 ISSN: 2502-4752 the sensor netw or k as most of routing protocols do not ha v e an y mechanism to def end against it. A w or mhole attac k can cause the sensor nodes in the target area to b uild a route through an attac k er which can later tamper with the data messages , or selectiv ely f orw ard data messages . Ho w e v er , most of the researchers proposed solutions against a w or mhole attac k dur ing th e neigh- bor disco v er y process with the use of some special hardw are [11–13]. Moreo v er , their approach did not f ocus on ho w to b uild a secure route against the w or mhole attac k without an y additional special hardw are , such as a directional antenna, GPS , and a synchroniz ed cloc k. In a m ultihop wireless ad hoc Netw or k, mobile nodes cooper ate to f or m a Netw or k with- out using an y infr astr ucture such as access points or base stations . Instead, the mobile nodes f orw ard pac k ets f or each other , allo wing comm unication among nodes outside wireless tr ansmis- sion r ange . The nodes’ mobility and the fundamentally limited capacity of the wireless medium, together with wireless tr ansmission eff ects such as atten uation, m ultipath propagation, and in- terf erence , combine to create significant challenges f or routing protocols oper at ing in an ad hoc netw or k. Se v er al routing protocols f or wireless sensor netw or ks ha v e been de v eloped . GRPW - MuS w as proposed in [14], which belongs to the geog r aphical f or wireless sensor netw or ks class of routing prot ocols . GRPW -MuS is an optimization of the classical geog r aphical algor ithm tai- lored to the requirements of a mobile wireless . The k e y concept used in the protocol is m ultle v els rela ys (MLRs). MLRs are nodes selected in charge of f o rw ar ding broadcast messages dur ing the flooding process in each logical le v el. This technique substantially reduces the message o v erhead as compared with a classical flooding mechanism, where e v er y node retr ansmits each message when it receiv es the first cop y of the message . So this protocol is par ticular ly suitab le f or large and dense Netw or k. In Ref erence[15], attac ks on WSNs protocols gener ally f all into one of tw o f ollo w- ing categor ies: routing-disr upt ion attac ks and resource consumption attac ks . W or mhole attac k is classified into routing-disr uption attac ks . In the w or mhole attac k, an attac k er records pac k ets (or bits) at one location in the Netw or k, tunnels them to another location, and rela ys them there . Due to the nature of wireless tr ansmission, the attac k er can create a w or mhole e v en f or pac k ets not addressed to itself , since it can o v erhear them in wireless tr ansmission and tunnel them to the colluding attac k er at the opposite end of the w or mhole . The GRPW -MuS’ s neighbor disco v er y mechanisms rely hea vily on the reception of HELLO pac k ets to neighbor detection, so it is e xtremely vulner ab le to this att ac k. When an attac k er tun- nels through a w or mhole to a colluding attac k er near node B all HELLO pac k ets tr ansmitted b y node A , and lik e wise tunnels bac k to the first attac k er all HELLO pac k ets tr ansmitted b y B , then A and B will belie v e that the y are neighbors , which w ould cause the routing protocol to f ail to find routes when the y are not actually neighbors . Fur ther more , the attac k er is in visib le at higher la y- ers , unlik e a malicious node in a routing protocol, which can often easily be named, the presence of the w or mhole and the tw o colluding attac k ers at either endpoint of the w or mhole are not visib le in the route . The rest of the paper is organiz ed as f ollo ws: Section 2 discusses related w or k. Section 3 descr ibes the prob lem statement. Section 4 pro vides an o v er vie w of GRPW -MuS approach. Section 5 giv es a detailed descr iption of GRPW -MuS-S approach. Section 6 giv es cost analysis . Section 7 giv es perf or mance e v aluations , and Section 8 concludes the paper . 2. RELA TED W ORK AND B A CKGR OUND The impor tant approach f or pre v enting w or mhole attac ks is presented in Ref erences [16]. The main idea is that b y authenticating either an e xtremely precise timestamp or location inf or- mation combined with a loose timestam p , a receiv er can deter mine if the pac k et has tr a v ersed an unrealistic distance f or the specific netw or k technology used. T empor al leashes rely on e xtremely precise time synchronization and timestamps in each pac k et. But to c o nstr uct a tempor al leash, all nodes m ust ha v e tightly synchroniz ed cloc ks , which in f act are not easy to achie v e in MANET . Geog r aphical leashes rely on all nodes kno wing its o wn location and ha vin g loosely synchroniz ed cloc k. In that paper , the authors also point out that in some circumstances , bounding the distance betw een the sender and receiv er , cannot pre v ent w or mhole attac ks . Another method of pre v ent- ing w or mhole tac ks is kno wn as RF w ater mar king- -, which authenticates a wireless tr ansmission IJEECS V ol. 5, No . 1, J an uar y 2017 : 147 158 Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS ISSN: 2502-4752 149 b y modulating the RF w a v ef or m in a w a y kno wn only to author iz e node . But if the r adio band in which comm unications are taking place is kno wn, then an attac k er can attempt to tunnel the entire signal from one location to another . Some authors also propose using intr usion detection to han- dle the w or mhole at tac k, b ut intr usion detection is difficult to isolate the attac k er in a softw are-only approach. In [17] presented a gener al mechanism, called pac k et leashes , f or detecting and thus def ending against w or mhole attac ks in wireless netw or ks . The y presented tw o types of pac k et leashes: geog r aphic leashes and tempor al leashes . A geog r aphical leash ensures that the recip- ient of the pac k et is within a cer tain distance from the sender . T o co nstr uct a geog r aphical leash, each node m ust kno w its o wn location, and all nodes m ust ha v e loosely synchroniz ed cloc ks . A tempor al leash ensures that the pac k et has an upper bound on its lif etime , which restr icts the maxim um tr a v el distance since the pac k et can tr a v el as f ast as the speed of ligh t. T o constr uct a tempor al leash, all nodes m ust ha v e tightly synchroniz ed cloc ks . The disadv antage of using pac k et leashes is that the y require either location inf or mation f or each node or need t ight cloc k synchronization betw een the nodes . In [18] ha v e presented a solution that uses directional antennas b y mobile nodes to def end against w or mholes . Their assumption is that if there is no w or mhole attac k and if one node sends pac k ets in a giv en direction, then its neighbor will get that pac k et from the opposite direction. The neighbor ing nodes e xamine the directions of the receiv ed signals from each other with a shared witness . Only when the directions of both pairs match, the neighbor ing relation is confir med. The disadv antage is that each node is to be equip ped with the special hardw are called directional antenna, which is not alw a ys possib le . In [19] proposed a g r aph theoretic model f or char acter izing a w or mhole attac k and de- r iv ed the necessar y and sufficient conditions f or an y candidate solut ion to pre v ent w or mholes . In this approach, a small fr action of the nodes needs to be equipped with a GPS receiv er . In [20] proposed a mechanism, MDSV O W , to detect w or mholes in a sensor netw or k. MDS-V O W detects a w or mhole b y visualizing the anomalies introduced b y an attac k. The anomalies , which are caused b y the f ak e connections through the w or mhole , bend the reconstr ucted surf ace to pull the sensors that are f ar a w a y to each other . By detecting this bending f eature , the w or mhole is located and f ak e connections are identified. The disadv antage is that the message o v erhead is high because all of the sensors need to send their neighbor lists to the base station . In [21], the authors proposed tw o mechanisms based on h ypothesis testing f or detecting w or mholes in wireless sensor netw or ks . The first mechanism, called the neighbor n umber test (NNT), detects increases in the n umber of neighbors of the sensors due to ne w links created b y the w or mhole in the netw or k. The second mechanism, called the all distances test (ADT), detects decreases in the lengths of the shor test pat hs betw een all pairs of sensors , which are due to the shor tcut links created b y a w or mhole in the netw or k. Both m echanisms assume that the sensors send their neighbor lists to the base station and the base st ation r uns the algor ithms on the netw or k topology . The disadv antages are (1) the message o v erhead is high because all of the sensors need to send their neighbor lists to the base station and (2) the mechanisms can only detect the presence of a w or mhole , b ut the y do not pinpoint its e xact location. 3. Pr ob lem statement Recall, in a w or mhole attac k, an attac k er receiv es pac k ets at one location in the netw or k, tunnels them to another location, and retr ansmits them there into the netw or k. In the basic route disco v er y process , t he base station star ts the route disco v er y b y broadcasting a routing beacon. Each node which receiv es the routing beacon records the base station’ s identity as its parent. Then, it rebroadcasts the routing beacon. The algor ithm cont in ues recursiv ely with each node mar king the first node from whom it hears a route beacon to be its parent. The basic route disco v er y process f ails if an attac k er receiv es the routing beacon at one point in the netw or k, tunnels it to another point in the netw or k, and then repla ys it into the netw or k from that point. Since the rout ing beacon tunneled b y the w or mhole reaches the targeted area consider ab ly f aster than it nor mally w ould ha v e through the m ulti-hop routing, the nodes near the endpoint of the w or mhole Attac ks and Secure Geog r aphic Routing in Wireless ... (Y assine Sabr i) Evaluation Warning : The document was created with Spire.PDF for Python.
150 ISSN: 2502-4752 will create a large routing sub-tree in the targeted area with themselv es as the root. F or e x emple , the attac k er tunnels the routing beacon from M 1 to M 2 . The nodes in the target area b uild the route through the w or mhole loca ted betw een M 1 and M 2 . All the tr affic in the targeted area will be channeled through the w or mhole . If an attac k er perf or ms this tun neling honestly and reliab ly , no har m is done; the attac k er actually pro vides a useful ser vice in connecting the netw or k more efficiently [22]. Ho w e v er , the w or mhole puts the attac k er in a v er y po w erful position relativ e to other nodes in the netw or k. The attac k er discards r ather than f orw ard ing all the data pac k ets . Thereb y , it creates a per manent denial-of-ser vice attac k, where the base station cannot receiv e an y inf or mation from the target area. Also , the attac k er can e xploit the w or mhole to selectiv ely discard or modify cer tain data pac k ets . System assumption. W e assume that the sensor nodes after deplo yment are not mo v ab le . Each sensor node has the same en ergy at the star t. It has a unique identity (ID) and an initial k e y KI and the r andom function f . W e assume that the initial k e y KI is stored in the memor y , which can be er ased completely [23]. The sensor nodes comm unicate using RF (r adio frequency), so broadcast is the fundamental comm unication pr imitiv e [24]. T w o nodes within each other s tr ansmission r ange are called one-hop neighbors . W e assume that comm unication channels are bidirectional [24], i.e . if a node y can receiv e a message from z , then it can also send a message to z . W e assume that the channel, based on MA C protocols [25], betw een the sensor nodes is reliab le . That is , the signals sent from diff erent sensor nodes across the same channel do not collide . 4. Security sc heme W e use an adaptation of the tr ust model [26] configured b y Marsh f or use in pure ad hoe Netw or ks . Marsh’ s model computes situational tr ust in agents based upon the gener al tr ust in the tr ustor and in t he impor tance and utility of the situation in which an agent finds itself . Gener al tr ust is basically the tr ust that one entity assigns another entity based upon all pre vious tr ans- actions in all situations . In our model each node ha v e a tr ust e v aluator which gathers data from the neighbor’ s e v ents in all states , filters it, assigns w eights to each e v ent and computes diff erent tr ust le v els based upon them. The tr ust e v aluator has three functions: tr ust der iv ation, quantifi- cation, and computation. At first, in GRPW -Mus the tr ust can come from the inf or mation about the successful tr ansmission of an y pac k et that is rela y ed b y the neighbor ing node , such as some ac kno wledgments . Second, the neighbor ing node’ s HELLO pac k et receiv ed on schedule can also conduce to the tr ust. These e v ents can be categor iz ed into data and control pac k et types , and in each e v ent there are tw o states: success and f ail, which record the n umber of successful e v ents and f ailed e v ents respectiv ely . In tr ust quantification process , w e represent tr ust from 1 to 1 sig- nifying a contin uous r ange from complete distr ust to complete tr ust. T r ust computation in v olv es an assignment of w eights to the e v ent that w ere monitored and quantified. W e use the contin uous r ange from 0 to 1 f or representing the significance of a cer tain e v ent from unimpor tant to most impor tant. The higher w eights represent the e v ent more impor tant. W e define the tr ust T to the neighbor ing node y b y the node x , and it is giv en b y the f ollo wing equation: T x ( y ) = n X i =1 [ W x ( i ) T x ( i )] (1) where W x ( i ) is the w eight of the i th tr ust categor y to x and T x ( i ) is the situational tr ust of x in the i th tr ust categor y . The n represents the n umber of categor y . F rom abo v e equation, w e can get the f ollo wing equations : C h = H S H F H S + H F f or H S + H F 6 = 0 el se C h = 0 (2) Negativ e v alues represent that more f ailed e v ents occur than successes . Hence , a v alue of 1 represents complete distr ust, a v alue of 0 implies a non-contr ib uting e v ent and a v alue of +1 means absolute tr ust in a par ticular e v ent. No w the node x can get the whole tr ust T to the neighbor ing node y . IJEECS V ol. 5, No . 1, J an uar y 2017 : 147 158 Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS ISSN: 2502-4752 151 T x ( y ) = W x ( C h ) T x ( C h ) + W x ( C d ) T x ( C d ) (3) 5. GRPW -MuS re vie w In this section w e will f ocus on introducing the GRPW -MuS Routing approach as this is the f oundation f or our w or k. F or a more elabor ate descr iption to GRPW -Mus please ref er to [14]. GRPW -Mus Is a geog r aphic routing protocol f or wireless sensor netw or ks f or m ultiple sink, Based on a par titioned topology in circular logic le v els ,each node can get its o wn location inf or mation either b y GPS or other location ser vices . The routing of data is inspired b y the pr in- ciple of w ater flo w in a w ashbasin b y creating the vir tual logic le v els as descr ibed in the figure 1 and 2 . After this logical netw or k reconstr uction ,each sink estab lishes its area based on the sink D S position. The routing of captured data be perf or med within each z one belonging to each node using the GRPW -Mus method f or each Area Sink . Lev el 0 Lev el 1 Lev el 2 Lev el 3 Lev el 4 SB ( sink ) Figure 1. Illustr ation of GRPW -MuS routing netw or k le v els Lev el 0 Lev el 1 Lev el 2 Lev el 3 Lev el 4 Source Designated Sink (DS) S I N K secondar y S I N K secondar y inter nal node Bac kbone area sink Area border noeud Area border noeud Figure 2. Illustr ation of GRPW -MuS routing netw or k le v els The procedure of GRPW -MuS is as f ollo ws . Ev er y node broadcasts HELLO messages that contain one-hop neighbor inf or mation per iodically . The TTL of HELLO messages is 1 , so the y should not f orw arded b y its neighbors . With the aid of HELLO messages , e v er y node obtains local Attac ks and Secure Geog r aphic Routing in Wireless ... (Y assine Sabr i) Evaluation Warning : The document was created with Spire.PDF for Python.
152 ISSN: 2502-4752 topology inf or mation. A node (also called D S ) chooses a subset of its neighbors to act as m ulti- point rela ying nodes f or it is based on the local Le v el topology inf or mation, which Le v el specified in the per iodic HELLO messages later . D S nodes perf or m tw o tasks: 1. when the Sink sends or f orw ards a broadcast pac k et, only its D S nodes among all its neigh- bors f orw ard the pac k et 2. the D S nodes per iodically broadcast its selector list . Thus e v er y node in the each le v el kno ws through which D S nodes e v er y other node could be reached. With each le v el’ s topology inf or mation stored and updated at e v er y node , a sh or test path from one node to e v er y other node could be computed with GRPW -Mus algor ithm, which goes along a ser ies of D S node . 6. Extension to GRPW -MuS The fr ame w or k of e xtension to GRPW -Mus is sho wn in Fig.3 Figure 3. F r ame w or k of e xtension to GRPW -MuS When the n ode receiv es a ne w sender’ s HELLO message , it will mak e tw o ne w records ¡node , positiv e , negativ e , e v ent¿ , to record separ ately the e v ent of this sender’ s HELLO mes- sage’ s coming in time or not, and the e v ent of data f orw arding successfully or not. Then in inf or- mation collection there are tw o tab les to record e v er y possib le neighbor’ s e v ents . These tab les are the inputs of tr ust calculation. By tr ust calculation, e v er y possib le neighbor will get a v alue which represents the probability of the neighb or relationship . The tuples neighbor , probability ¿ will be recorded in Neighbor Set. Some GRPW -MuS inf or mation repositor ies and pac k ets’ f or mat should be modified. When the node broadcasts the HELLO message , it contains its neighbor in- f or mation including the recommendation about the probability of neighbor relationships . F rom re- ceiving others HELLO messages , e v er y node obtains local topology inf or mation. When choosing MPR nodes , the node will tak e the nodCs recommendation as an impor tant f actor . When nodes e xchange the Hello messages which contain the inf or mation about the neighbor relationship’ s probability , e v er y node w ould get global topology inf or mation which can constr uct a w eighted di- rected g r aph. The w eight on the edge represents the e v aluation of edge star t point on the link e xistence betw een it self and the end point.Then from the w eighted directed g r aph of the global topology , w e can use Dijkst r a algor ithm to calculate the routing tab le . In this process , the proba- bility of the ”being a neighbor” is considered as the w eight. 7. P erf ormance e v aluations F or perf or mance analysis , w e ha v e sim ulated GRPW -MS-S protocol using OMNET++ discrete e v ent sim ulator [27]. As OMNET++ is not de v eloped f or the sensor netw or k, a sensor netw or k en vironment is created in OMNET++ with the installation of a MiXiM fr ame w or k patch [28]. In this sim ulation, w e sim ulate 1600 sensor nodes . The tr ansmi s sio n r ange f or each sensor node is 40 m . T r ansmit P o w er P t is the po w er with which the signal is tr ansmitted. The T r ansmit IJEECS V ol. 5, No . 1, J an uar y 2017 : 147 158 Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS ISSN: 2502-4752 153 P o w er P t decides the tr ansmission r ange f or the sensor node . T r ansmit P o w er (txP o w er) is the po w er consumed b y the tr ansceiv er to tr ansmit a data pac k et. Rece iv e P o w er (rxP o w er) is the po w er consumed to receiv e a data pac k et. w e can see that there are some f alse positiv es , which means that some nodes are mistak enly detected to be connected b y the w or mhole since t he y are actually close nodes . In this section, w e sim ulate the f alse positiv es under diff erent deplo yments and diff erent threshold s used . The pur pose of this sim ulation is to control the f alse positiv es to the minim um. W e design f our diff erent types of sensor deplo yment: 1. Random deplo yment within the g r id (RandomGr id): The whole sensor deplo yment area is divided into g r ids with only one sensor node f or each g r id. The position of the sensor node in the g r id is r andom. 2. Random deplo yment in the whole area (RandomArea): All sensor nodes are r andomly de- plo y ed in the whole deplo yment area. 3. Nor mal distr ib ution within the g r id (Nor malGr id): The whole sensor deplo yment area is di- vided into subareas , where each sub-area holds an equal n umber of sensor nodes . More specifically , let the total n umber of sensor nodes be N, the total n umber of divided g r ids be N g r id , then each g r id contains ( N = N g r id ) sensor nodes . Within each g r id, the sensor nodes are deplo y ed using the nor mal distr ib ution. 4. Nor mal distr ib ution in the whole area (Nor malArea): All sensor nodes are deplo y ed in the whole deplo yment area f ollo wing the nor mal distr ib ution. 10 20 30 40 2 4 6 8 10 Density 10 3 =m 2 F alse P ositiv e % RandomGr id RandomArea Nor malArea Nor malGr id Figure 4. F alse positiv e vs . density ( T h = 4 ). Figs . 5 and 4 descr ibe the relationship betw een the f alse positiv es and the density of the sensor netw or k with the diff erent types of sensor deplo yment under a specific threshold T h . W e find that when the threshold T h is equal to or less than 6 , all of th e f our deplo yments ha v e f alse positiv es t hat are less than 10% . F rom Fig 4, w e find that the Nor malGr id has higher f alse positiv es than other deplo yments . Moreo v er , the f alse positiv es f or Nor malGr id deplo yment in- creases when the density of the sensor nodes increases . This is because in Nor malGr id, when the density increases , each g r id co v ers more nodes . Since nodes in each g r id are deplo y ed with the nor mal distr ib ution, the nodes ha v e more chance to become close nodes in each g r id. This causes more f alse positiv es . W e cannot see m uch diff erence in the f alse positiv es f or the other deplo yments , which are RandomGr id, RandomArea, and Nor malArea. Their f alse positiv es are lo w (less than 10% ) if the threshold Th is belo w 12 . Moreo v er , w e find that the f alse positiv es are roughly the same when the density of the sensor netw or k increases . Th is is because in Random- Gr id/RandomArea, the nodes are r andomly deplo y ed. The nodes could be closer b ut the y are still Attac ks and Secure Geog r aphic Routing in Wireless ... (Y assine Sabr i) Evaluation Warning : The document was created with Spire.PDF for Python.
154 ISSN: 2502-4752 10 20 30 40 5 10 15 20 Density 10 3 =m 2 F alse P ositiv e % RandomGr id RandomArea Nor malArea Nor malGr id Figure 5. F alse positiv e vs . density ( T h = 10 ). not close enough according to so called close nodes . So w e cannot see the f alse positiv e g ro wing with increasing density . In Nor malArea, the nodes are deplo y ed with the nor mal distr ib ution in the area. When the density increases , most the nodes or iginally close are still close . Theref ore , the f alse positiv es do not g ro w with increasing density . F rom the abo v e analysis , to minimiz e the f alse positiv es , a good distr ib ution and a good threshold Th m ust be selected. T o k eep the f alse positiv es belo w 10% , the ideal distr ib ution can be RandomGr id, RandomArea, and Nor malArea with a maxim um threshold Th v alue of 12 . 50 100 150 5 10 Sim ulation Time (s) tr ansmission speed ( K b :s 1 ) GRPW -MS GRPW -MS-s Figure 6. W or mhole attac k analysis In the netw or k there are a set of attac king nodes which represents 20% of the netw or k nodes , which are A 1 and A z in the figure . F or e x emple , A 1 and A 2 , which are the tunnel’ s tw o ends , will e x ecute the w or mhole attac k. A 1 will tunnel all i t’ s hear ing HELLO pac k ets to A 2 , A 2 will also tunnel all the hear ing HELLO pac k ets to A 1 , then both of th em will repla y the HELLO pac k ets . W e sim ulate the or iginate GRPW -MS protocol and the re vised protocol GRPW -MS-S under the same condition. The results are sho wn in Fig. 6. F rom the figure , w e can see that the lo w er line is a z ero line which sim ulate the or iginate GRPW -MS protocol. The z ero means that No can not find a r ight route to send the pac k et , so Nu receiv es nothing . All these happened cases are caused b y w or mhole attac k ers making misbelie ving being its neighbor . Th e upper line is the result of sim ulating the re vised GRPW -MS-S protocol, w e can f ound at first node also can not find the r ight route , b ut after e v aluating some neighbor’ s tr ustiness , eache node star t to choose IJEECS V ol. 5, No . 1, J an uar y 2017 : 147 158 Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS ISSN: 2502-4752 155 another route to send the pac k et, after man y times tr ying and e v aluating, No finally find a stab le route to Nal, so in the figure it sho ws that the tr ansmitting r ate is going to k eep stab le with time , and after 20 s , it k eeps about 10 : 0 k b=s . 50 100 150 200 50 100 Sim ulation Time (s) The n umber of pac k ets on the w or mhole link W or mhole attac k Def end attac k Figure 7. The n umber of pac k ets on the w or mhole link against time f or GPR W -MS-S Finally , w e e v aluate the def ending eff ectiv eness after detecting the w or mhole attac k. When the w or mhole attac k is initiated, the surrounding pac k ets w ould tr ansf er from the or igi- nal route to this highquality w or mhole link. As sho wn in the Fig.7, the dot cur v e indicates that the n umber of pac k ets on the w or mh ole link dr amatically increases after the w or mhole attac k; when the def ending nodes begin to tak e def ensiv e measures , the square cur v e re v eals that the n umber of pac k ets on the w or mhole link g ro ws e xponentially . Gr adually , the w or mhole link be- comes congested and the metr ic of link decreases , which indicates that our algor ithm’ s def ense against w or mhole is eff ectiv e . Theref ore , when the nodes cond uct the neighbor disco v er y , the y will remo v e the malicious nodes from their respectiv e neighbor lists and the w or mhole link gets eliminated. 10 20 30 40 92 94 96 98 Density 10 3 =m 2 W or mhole detection r ate GRPW -MS GRPW -MS-s Figure 8. W or mhole detection r ate against density ( T h = 10 ). w e e v aluate the algor ithm’ s perf or mance on detecting w or mhole b y v ar ying the length of w or mhole link. Fig.8 re v eals the relationship betw een w or mhole detection r ate and the density . In Attac ks and Secure Geog r aphic Routing in Wireless ... (Y assine Sabr i) Evaluation Warning : The document was created with Spire.PDF for Python.
156 ISSN: 2502-4752 Fig.8, w e can find that tw o algor ithms both ha v e a high detection r ate . In GRPW -MS algor ithm, when density v ar ies from 5 to 20 , the detection r ate has a slight do wnw ard trend. When density contin ues to increase , the detection r ate le v els off , maintaining at about 0 : 955 . By contr ast, in our proposal, the detection r ate sho ws an upw ard trend with the increase of density . Moreo v er , when density is g reater than 10 , the detection r ate of our algor ithm GRPW -MS-S is higher than that of GRPW -MS . The reason is that the longer the w or mhole link is , the more hops the pac k ets ha v e to pass from source to destination if pac k ets are tr ansmitted through the nor mal link. But if there e xists a w or mhole link, the hops betw een source and destination w ould dr amatically decrease and thus mak e the w or mhole attac k eff ect m uch more significant. So , according to our algor ithm, w e can easily detect the w or mhole attac k and thus get a high detection r ate . 8. Conc lusions Because of the wireless medium’ s openness , e v er y node can hear the neighbor’ s r adio without being detected. When tw o or more malicious nodes constr uct one or more w or mholes , the y can destro y the entire Netw or k b y disr upting the routing proto col, especially to GRPW -Mus protocols . In this paper w e introduced a tr ust model to e v aluate the tr ustiness of ”a node is the neighbor” in GRPW -Mus protocol. F rom the tr ustiness calculating, the node can get the r ight route instead of choosing the route caused b y w or mhole attac k. This scheme can r un with no need f or netw or k synchronization and GPS de vices . But the scheme is based on tr ust e v aluation, which predicts the future e v ents b y collecting the past e v ents , so the tr ust e v aluated b y the node lags behind the attac ks . In future w or k, w e will w or k on ho w to secure the tr ustiness message tr ans- mission and ho w to get the recommended path in tr ust g r aph. W e also tak e the node’ s mobility into consider ation, because when the netw or k topology changing f ast, the route will change f ast, which means the tr ust model should k eep tr ac k with it. Ref erences [1] S . K. J angir and N. Hemr ajani, “Ev aluation of b lac k hole , w or mhole and sybil attac ks in mobile ad-hoc netw or ks , in Proceedings of the Second Inter national Conf erence on Inf or mation and Comm unication T echnology f or Competitiv e Str ategies , ser . ICTCS ’16. Ne w Y or k, NY , USA: A CM, 2016, pp . 74:1–74:6. [O nline]. A v ailab le: http://doi.acm.org/10.1145/2905055.2905133 [2] R. Mudgal and R. Gupta, “An efficient approach f or w or mhole detection in manet, in Proceedings of the Second Inter national Conf erence on Inf or mation and Comm unication T echnology f or Competitiv e Str ategies , ser . ICTCS ’16. Ne w Y or k, NY , USA: A CM, 2016, pp . 29:1–29:6. [Online]. A v ailab le: http://doi.acm.org/10.1145/2905055.2905235 [3] M. Cinque , A. Coronato , A. T esta, and C . Di Mar tino , “A sur v e y on resiliency assessment techniques f or wireless sensor netw or ks , in Proceedings of the 11th A CM Inter national Symposium on Mobility Management and Wireless Access , ser . MobiW ac ’13. Ne w Y or k, NY , USA: A CM, 2013, pp . 73–80. [Online]. A v ailab le: http://doi.acm.org/10.1145/2508222.2508235 [4] I. Ouaf aa, L. J alal, K. Salah-ddine , and E. H. Said, “The compar ison study of hier archical routing protocols f or ad-hoc and wireless sensor netw or ks: A liter ature sur v e y , in Proceedings of the The Inter national Conf erence on Engineer ing & MIS 2015 , ser . ICEMIS ’15. Ne w Y or k, NY , USA: A CM, 2015, pp . 32:1–32:8. [Online]. A v ailab le: http://doi.acm.org/10.1145/2832987.2833039 [5] K. S . Hamza and F . Amir , “Centr aliz ed cluster ing e v olutionar y algor ithms f or wireless sensor netw or ks , in Proceedings of the 10th Inter national Conf eren c e on Inf or matics and Systems , ser . INFOS ’16. Ne w Y or k, NY , USA: A CM, 2016, pp . 273–277. [Online]. A v ailab le: http://doi.acm.org/10.1145/2908446.2908493 IJEECS V ol. 5, No . 1, J an uar y 2017 : 147 158 Evaluation Warning : The document was created with Spire.PDF for Python.