Cargando…
A wormhole attack detection method for tactical wireless sensor networks
Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology. WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. As one of the mor...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10495966/ https://www.ncbi.nlm.nih.gov/pubmed/37705659 http://dx.doi.org/10.7717/peerj-cs.1449 |
_version_ | 1785105006869872640 |
---|---|
author | Zhang, Ke |
author_facet | Zhang, Ke |
author_sort | Zhang, Ke |
collection | PubMed |
description | Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology. WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. As one of the more severe threats, wormholes create passive attacks that are hard to detect and eliminate. Since WSN is often used in the tactical network field, a planned secure network is essential for military applications with high security. Guard nodes are traffic monitoring nodes used to supervise neighbors’ data communication around the tactical networks. Therefore, this work proposes a Quality of Service (QoS) security mechanism to select multiple dual-layer guard nodes at different paths of the WSN based on the path qualities to detect wormholes. The entire network’s links are categorized into high, normal, and low priority levels. As such, this study aimed to confirm the security of high priority nodes and links in the tactical network, avoid excessive overhead, and provide random security facilities to all nodes. The proposed measures of the QoS-based security provision, including link cluster formation, guard node selection, authenticated guard node identification, and intrusion detection, ensure economic and efficient network communication with different quality levels. |
format | Online Article Text |
id | pubmed-10495966 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-104959662023-09-13 A wormhole attack detection method for tactical wireless sensor networks Zhang, Ke PeerJ Comput Sci Artificial Intelligence Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology. WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. As one of the more severe threats, wormholes create passive attacks that are hard to detect and eliminate. Since WSN is often used in the tactical network field, a planned secure network is essential for military applications with high security. Guard nodes are traffic monitoring nodes used to supervise neighbors’ data communication around the tactical networks. Therefore, this work proposes a Quality of Service (QoS) security mechanism to select multiple dual-layer guard nodes at different paths of the WSN based on the path qualities to detect wormholes. The entire network’s links are categorized into high, normal, and low priority levels. As such, this study aimed to confirm the security of high priority nodes and links in the tactical network, avoid excessive overhead, and provide random security facilities to all nodes. The proposed measures of the QoS-based security provision, including link cluster formation, guard node selection, authenticated guard node identification, and intrusion detection, ensure economic and efficient network communication with different quality levels. PeerJ Inc. 2023-08-29 /pmc/articles/PMC10495966/ /pubmed/37705659 http://dx.doi.org/10.7717/peerj-cs.1449 Text en ©2023 Zhang https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Artificial Intelligence Zhang, Ke A wormhole attack detection method for tactical wireless sensor networks |
title | A wormhole attack detection method for tactical wireless sensor networks |
title_full | A wormhole attack detection method for tactical wireless sensor networks |
title_fullStr | A wormhole attack detection method for tactical wireless sensor networks |
title_full_unstemmed | A wormhole attack detection method for tactical wireless sensor networks |
title_short | A wormhole attack detection method for tactical wireless sensor networks |
title_sort | wormhole attack detection method for tactical wireless sensor networks |
topic | Artificial Intelligence |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10495966/ https://www.ncbi.nlm.nih.gov/pubmed/37705659 http://dx.doi.org/10.7717/peerj-cs.1449 |
work_keys_str_mv | AT zhangke awormholeattackdetectionmethodfortacticalwirelesssensornetworks AT zhangke wormholeattackdetectionmethodfortacticalwirelesssensornetworks |