Cargando…

A wormhole attack detection method for tactical wireless sensor networks

Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology. WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. As one of the mor...

Descripción completa

Detalles Bibliográficos
Autor principal: Zhang, Ke
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10495966/
https://www.ncbi.nlm.nih.gov/pubmed/37705659
http://dx.doi.org/10.7717/peerj-cs.1449
_version_ 1785105006869872640
author Zhang, Ke
author_facet Zhang, Ke
author_sort Zhang, Ke
collection PubMed
description Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology. WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. As one of the more severe threats, wormholes create passive attacks that are hard to detect and eliminate. Since WSN is often used in the tactical network field, a planned secure network is essential for military applications with high security. Guard nodes are traffic monitoring nodes used to supervise neighbors’ data communication around the tactical networks. Therefore, this work proposes a Quality of Service (QoS) security mechanism to select multiple dual-layer guard nodes at different paths of the WSN based on the path qualities to detect wormholes. The entire network’s links are categorized into high, normal, and low priority levels. As such, this study aimed to confirm the security of high priority nodes and links in the tactical network, avoid excessive overhead, and provide random security facilities to all nodes. The proposed measures of the QoS-based security provision, including link cluster formation, guard node selection, authenticated guard node identification, and intrusion detection, ensure economic and efficient network communication with different quality levels.
format Online
Article
Text
id pubmed-10495966
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-104959662023-09-13 A wormhole attack detection method for tactical wireless sensor networks Zhang, Ke PeerJ Comput Sci Artificial Intelligence Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology. WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. As one of the more severe threats, wormholes create passive attacks that are hard to detect and eliminate. Since WSN is often used in the tactical network field, a planned secure network is essential for military applications with high security. Guard nodes are traffic monitoring nodes used to supervise neighbors’ data communication around the tactical networks. Therefore, this work proposes a Quality of Service (QoS) security mechanism to select multiple dual-layer guard nodes at different paths of the WSN based on the path qualities to detect wormholes. The entire network’s links are categorized into high, normal, and low priority levels. As such, this study aimed to confirm the security of high priority nodes and links in the tactical network, avoid excessive overhead, and provide random security facilities to all nodes. The proposed measures of the QoS-based security provision, including link cluster formation, guard node selection, authenticated guard node identification, and intrusion detection, ensure economic and efficient network communication with different quality levels. PeerJ Inc. 2023-08-29 /pmc/articles/PMC10495966/ /pubmed/37705659 http://dx.doi.org/10.7717/peerj-cs.1449 Text en ©2023 Zhang https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Artificial Intelligence
Zhang, Ke
A wormhole attack detection method for tactical wireless sensor networks
title A wormhole attack detection method for tactical wireless sensor networks
title_full A wormhole attack detection method for tactical wireless sensor networks
title_fullStr A wormhole attack detection method for tactical wireless sensor networks
title_full_unstemmed A wormhole attack detection method for tactical wireless sensor networks
title_short A wormhole attack detection method for tactical wireless sensor networks
title_sort wormhole attack detection method for tactical wireless sensor networks
topic Artificial Intelligence
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10495966/
https://www.ncbi.nlm.nih.gov/pubmed/37705659
http://dx.doi.org/10.7717/peerj-cs.1449
work_keys_str_mv AT zhangke awormholeattackdetectionmethodfortacticalwirelesssensornetworks
AT zhangke wormholeattackdetectionmethodfortacticalwirelesssensornetworks