Various OSI Layer Attacks and Countermeasure to
Enhance the Performance of WSNs during Wormhole
Attack
D. Kaur, and P. Singh. ACEEE International Journal of Network Security, 5 (1):
6(January 2014)
Abstract
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
%0 Journal Article
%1 kaur2014various
%A Kaur, Damandeep
%A Singh, Parminder
%D 2014
%E Das, Dr. Vinu V
%J ACEEE International Journal of Network Security
%K Malevolent_nodes Promiscuous_mode Wormhole_Attack
%N 1
%P 6
%T Various OSI Layer Attacks and Countermeasure to
Enhance the Performance of WSNs during Wormhole
Attack
%U http://searchdl.org/public/journals/2014/IJNS/5/1/11.pdf
%V 5
%X Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
@article{kaur2014various,
abstract = {Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.},
added-at = {2014-02-13T10:02:09.000+0100},
author = {Kaur, Damandeep and Singh, Parminder},
biburl = {https://www.bibsonomy.org/bibtex/2afc51a599076c721cb82501b1fb0a4eb/ideseditor},
editor = {Das, Dr. Vinu V},
interhash = {743ddd07f24ea52de82231ee2dd05186},
intrahash = {afc51a599076c721cb82501b1fb0a4eb},
journal = {ACEEE International Journal of Network Security},
keywords = {Malevolent_nodes Promiscuous_mode Wormhole_Attack},
month = {January},
number = 1,
pages = 6,
timestamp = {2014-02-13T10:02:09.000+0100},
title = {Various OSI Layer Attacks and Countermeasure to
Enhance the Performance of WSNs during Wormhole
Attack},
url = {http://searchdl.org/public/journals/2014/IJNS/5/1/11.pdf},
volume = 5,
year = 2014
}