Analysis and Countermeasures of Wormhole and Sinkhole Attacks in WBAN
Wireless Body Area Network (WBAN) is a promising technology that is having a significant number of applications in healthcare. Despite having several benefits, WBAN is susceptible to several security attacks, particularly related to the node misbehavior attacks such as sinkholes, wormholes, blackholes, and gray hole attacks. In this research work, the performance of the AODV protocol against wormhole and sinkhole attacks has been analyzed. This comparison-based study has been achieved for the PDR (Packet Delivery Ratio), NRL (Normalized Routing Load), residual energy, packet loss, average throughput, and average end-to-end delay metrics for WBAN with 20 and 50 nodes respectively. The results show that in 20 nodes network the PDR and average throughput of the sinkhole is 32% and 53% more than the wormhole attack, respectively. However, NRL is 36% and the average e2e delay is 63% less than the wormhole attack. In 50 nodes network, the PDR of a sinkhole attack is 26% and the average throughput is 10.7% more than the wormhole attack. Though, NRL and average e2e delays are 41.7% and 78.5% less than the wormhole attack, respectively. Hence, the wormhole attack in either network is more destructive than the sinkhole attack. Based on the simulation results, some solutions against the mentioned attacks have been recommended.
 S. Singh and D. Prasad, “Materials Today : Proceedings Wireless body area network ( WBAN ): A review of schemes and protocols,” Mater. Today Proc., no. xxxx, 2021.
 P. Usha and N. Priya, “Survey on Security Issuses in WBAN,” Int. J., vol. 5, no. 1, pp. 482–485, 2015.
 Saleem, “On the Security Issues in Wireless Body Area Networks,” Int. J. Digit. Content Technol. its Appl., vol. 3, no. 3, 2009.
 A. Ghumro, A. Ahmed, and A. K. Memon, “Node Misbehavior Attacks in WBAN: Effects and Countermeasures,” vol. 2019, no. April, pp. 10–12, 2019.
 U. Ghugar and J. Pradhan, “Survey of wormhole attack in wireless sensor networks,” Comput. Sci. Inf. Technol., vol. 2, no. 1, pp. 33–42, 2021.
 G. Kaur and A. Kaur, “Performance Analysis of AODV for Wormhole Attack Using Different Mobility Models,” pp. 69–72, 2014.
 M. Tahboush and M. Agoyi, “A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network ( MANET ),” vol. 9, 2021.
 T. Parkavi and L. Arockiam, “A Survey on Sinkhole Attack in RPL,” Ann. Rom. Soc. Cell Biol., vol. 25, no. 5, pp. 511–515, 2021.
 A. Daniel, “A Survey on Detection of Sinkhole Attack in Wireless Sensor Networks,” vol. 91, no. 7, pp. 48–52, 2014.
 I. Raju and P. Parwekar, “Detection of sinkhole attack in wireless sensor network,” Adv. Intell. Syst. Comput., vol. 381, no. July, pp. 629–636, 2016.
 D. Kaur and P. Singh, “Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WSNs during Wormhole Attack,” ACEEE Int. J. Netw. Secur., vol. 5, no. 1, pp. 62–67, 2014.
 mojtaba ghanaatpisheh Sanaei, Is. F. Isnin, and M. Bakhtiari, “Performance evaluation of Routing Protocol on AODV and DSR under Wormhole Attack,” 2013 IEEE 2nd Int. Conf. Image Inf. Process. IEEE ICIIP 2013, vol. 1, no. 1, pp. 699–702, 2013.
 T. Jamal and S. A. Butt, “Malicious node analysis in MANETS,” Int. J. Inf. Technol., vol. 11, no. 4, pp. 859–867, 2019.
 N. Gandhewar and R. Patel, “Detection and prevention of sinkhole attack on AODV protocol in mobile adhoc network,” Proc. - 4th Int. Conf. Comput. Intell. Commun. Networks, CICN 2012, pp. 714–718, 2012.
 A. Studies and A. Studies, “A MACHINE LEARNING APPROACH TO DETECT NETWORK LAYER,” vol. 14, no. 03, 2022.
 S. Sharma, “Mitigation of Sinkhole Attack in MANET Using ACO,” vol. 3, no. 6, pp. 400–407.
 P. C. Paul, J. Loane, G. Regan, and F. McCaffery, “Analysis of Attacks and Security Requirements for Wireless Body Area Networks - A Systematic Literature Review,” Commun. Comput. Inf. Sci., vol. 1060, pp. 439–452, 2019.
 K. Ávila, P. Sanmartin, D. Jabba, and J. Gómez, An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN, vol. 122, no. 4. Springer US, 2022.
 F. T. Zuhra, K. A. Bakar, A. Ahmed, and M. A. Tunio, “Routing protocols in wireless body sensor networks: A comprehensive survey,” J. Netw. Comput. Appl., vol. 99, pp. 73–97, 2017.
 S. Zou, Y. Xu, H. Wang, Z. Li, S. Chen, and B. Hu, “A Survey on Secure Wireless Body Area Networks,” Secur. Commun. Networks, vol. 2017, 2017.
 P. Gondaliya et al., “Applications, Challenges, Security of Wireless Body Area Networks (Wbans) and Functionality of Ieee 802.15.4/Zigbee,” Sci.Int.(Lahore), vol. 83, no. 4, pp. 697–702, 2013.
 S. Saleem, S. Ullah, and K. S. Kwak, “Towards security issues and solutions in Wireless Body Area Networks,” INC2010 - Int. Conf. Networked Comput. Proceeding, pp. 349–352, 2010.
 J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, “TrueLink: A practical countermeasure to the wormhole attack in wireless networks,” Proc. - Int. Conf. Netw. Protoc. ICNP, pp. 75–84, 2006.
 I. Khalil, S. Bagchi, and N. B. Shroff, “LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks,” Proc. Int. Conf. Dependable Syst. Networks, pp. 612–621, 2005.
 S. Sharmila and G. Umamaheswari, “Detection of sinkhole attack in wireless sensor networks using message digest algorithms,” Proc. 2011 Int. Conf. Process Autom. Control Comput. PACC 2011, pp. 0–5, 2011.
 H. Shahid, H. Ashraf, H. Javed, M. Humayun, N. Jhanjhi, and M. A. Alzain, “Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks,” 2021.
 P. R. Raj and D. Anand, “Sink Hole Attack Detection using Two Step Verification Technique in Wireless Sensor Networks,” pp. 1245–1250, 2022.
 T. Khan et al., “ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs,” Futur. Gener. Comput. Syst., vol. 125, pp. 921–943, 2021.
 C. Konstantopoulos, B. Mamalis, and G. Pantziou, “Secure and trust-aware routing in wireless sensor networks,” ACM Int. Conf. Proceeding Ser., pp. 312–317, 2018.
 M. Meghdadi, S. Ozdemir, and I. Güler, “A survey of wormhole-based attacks and their countermeasures in wireless sensor networks,” IETE Tech. Rev. (Institution Electron. Telecommun. Eng. India), vol. 28, no. 2, pp. 89–102, 2011.
 M. Khabbazian, H. Mercier, and V. K. Bhargava, “Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks,” IEEE Trans. Wirel. Commun., vol. 8, no. 2, pp. 736–745, 2009.
 S. Vidhya and T. Sasilatha, “Sinkhole Attack Detection in WSN using Pure MD5 Algorithm,” Indian J. Sci. Technol., vol. 10, no. 24, pp. 1–6, 2017.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
All the articles published in this issue are licensed under the terms of the Creative Commons Attribution Non-Commercial License (CC Attribution 4.0 License. (http://creativecommons.org/licenses/by-nc/4.0/)) which permits unrestricted, non-commercial use, distribution and reproduction in any medium, provided the work is properly cited.