Wormhole detection in wireless sensor networks using spanning trees

Karoly Harsanyi, Attila Kiss, T. Szirányi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Wireless sensor networks and ad-hoc networks are gaining popularity rapidly due to their ability to solve challenging problems and the fact that, thanks to recent technological advancements, it is now possible to build smarter and denser networks. For example, they serve as the basis of the Internet of Things. Naturally, it is in the users best interest to develop increasingly secure networks. In some cases, the sensors are used in unknown or hostile environments. This and the vulnerability of the wireless communication channels used by arbitrary mobile communication networks means that they are exposed to various kinds of attacks. One of the most severe threats is the wormhole attack because an adversary can start the attack without compromising sensors or breaking through cryptographic defense mechanisms. In this paper, we propose a novel method for detecting wormhole attacks and identifying the affected sensors. Our approach does not rely on using any special measurement, only the connectivity information of the network.

Original languageEnglish
Title of host publication2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
Volume2018-January
ISBN (Electronic)9781538612088
DOIs
Publication statusPublished - Mar 26 2018
Event2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018 - Eger, Hungary
Duration: Jan 18 2018Jan 19 2018

Other

Other2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018
CountryHungary
CityEger
Period1/18/181/19/18

Fingerprint

Wireless sensor networks
Sensors
Ad hoc networks
Telecommunication networks
Internet of things

Keywords

  • network theory
  • security
  • sensor networks
  • wormhole

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Cite this

Harsanyi, K., Kiss, A., & Szirányi, T. (2018). Wormhole detection in wireless sensor networks using spanning trees. In 2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018 (Vol. 2018-January, pp. 1-6). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/FIOT.2018.8325596

Wormhole detection in wireless sensor networks using spanning trees. / Harsanyi, Karoly; Kiss, Attila; Szirányi, T.

2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018. Vol. 2018-January Institute of Electrical and Electronics Engineers Inc., 2018. p. 1-6.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harsanyi, K, Kiss, A & Szirányi, T 2018, Wormhole detection in wireless sensor networks using spanning trees. in 2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018. vol. 2018-January, Institute of Electrical and Electronics Engineers Inc., pp. 1-6, 2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018, Eger, Hungary, 1/18/18. https://doi.org/10.1109/FIOT.2018.8325596
Harsanyi K, Kiss A, Szirányi T. Wormhole detection in wireless sensor networks using spanning trees. In 2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018. Vol. 2018-January. Institute of Electrical and Electronics Engineers Inc. 2018. p. 1-6 https://doi.org/10.1109/FIOT.2018.8325596
Harsanyi, Karoly ; Kiss, Attila ; Szirányi, T. / Wormhole detection in wireless sensor networks using spanning trees. 2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018. Vol. 2018-January Institute of Electrical and Electronics Engineers Inc., 2018. pp. 1-6
@inproceedings{ae54e6bcd7fe4c76ace70994cdaf9c45,
title = "Wormhole detection in wireless sensor networks using spanning trees",
abstract = "Wireless sensor networks and ad-hoc networks are gaining popularity rapidly due to their ability to solve challenging problems and the fact that, thanks to recent technological advancements, it is now possible to build smarter and denser networks. For example, they serve as the basis of the Internet of Things. Naturally, it is in the users best interest to develop increasingly secure networks. In some cases, the sensors are used in unknown or hostile environments. This and the vulnerability of the wireless communication channels used by arbitrary mobile communication networks means that they are exposed to various kinds of attacks. One of the most severe threats is the wormhole attack because an adversary can start the attack without compromising sensors or breaking through cryptographic defense mechanisms. In this paper, we propose a novel method for detecting wormhole attacks and identifying the affected sensors. Our approach does not rely on using any special measurement, only the connectivity information of the network.",
keywords = "network theory, security, sensor networks, wormhole",
author = "Karoly Harsanyi and Attila Kiss and T. Szir{\'a}nyi",
year = "2018",
month = "3",
day = "26",
doi = "10.1109/FIOT.2018.8325596",
language = "English",
volume = "2018-January",
pages = "1--6",
booktitle = "2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Wormhole detection in wireless sensor networks using spanning trees

AU - Harsanyi, Karoly

AU - Kiss, Attila

AU - Szirányi, T.

PY - 2018/3/26

Y1 - 2018/3/26

N2 - Wireless sensor networks and ad-hoc networks are gaining popularity rapidly due to their ability to solve challenging problems and the fact that, thanks to recent technological advancements, it is now possible to build smarter and denser networks. For example, they serve as the basis of the Internet of Things. Naturally, it is in the users best interest to develop increasingly secure networks. In some cases, the sensors are used in unknown or hostile environments. This and the vulnerability of the wireless communication channels used by arbitrary mobile communication networks means that they are exposed to various kinds of attacks. One of the most severe threats is the wormhole attack because an adversary can start the attack without compromising sensors or breaking through cryptographic defense mechanisms. In this paper, we propose a novel method for detecting wormhole attacks and identifying the affected sensors. Our approach does not rely on using any special measurement, only the connectivity information of the network.

AB - Wireless sensor networks and ad-hoc networks are gaining popularity rapidly due to their ability to solve challenging problems and the fact that, thanks to recent technological advancements, it is now possible to build smarter and denser networks. For example, they serve as the basis of the Internet of Things. Naturally, it is in the users best interest to develop increasingly secure networks. In some cases, the sensors are used in unknown or hostile environments. This and the vulnerability of the wireless communication channels used by arbitrary mobile communication networks means that they are exposed to various kinds of attacks. One of the most severe threats is the wormhole attack because an adversary can start the attack without compromising sensors or breaking through cryptographic defense mechanisms. In this paper, we propose a novel method for detecting wormhole attacks and identifying the affected sensors. Our approach does not rely on using any special measurement, only the connectivity information of the network.

KW - network theory

KW - security

KW - sensor networks

KW - wormhole

UR - http://www.scopus.com/inward/record.url?scp=85050406007&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85050406007&partnerID=8YFLogxK

U2 - 10.1109/FIOT.2018.8325596

DO - 10.1109/FIOT.2018.8325596

M3 - Conference contribution

VL - 2018-January

SP - 1

EP - 6

BT - 2018 IEEE International Conference on Future IoT Technologies, Future IoT 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -