1604 | International Journal of Current Engineering and Technology, Vol.4, No.3 (June 2014) Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 - 5161 ©2014 INPRESSCO ® , All Rights Reserved Available at http://inpressco.com/category/ijcet Recovering from In-Band Wormhole Based Denial of Service in Wireless Sensor Networks Najma Farooq Ȧ* , Irwa Zahoor Ȧ and Sandip Mandal Ȧ Ȧ Department Of Computer Science And Technology ,Dehradun Institute Of Technology, Mussourie Diversion Road, Makkwala Dehradun, India Accepted 16 May 2014, Available online 01 June 2014, Vol.4, No.3 (June 2014) Abstract Wireless Sensor Networks (WSN) are composed of a large ,yet limited number of sensing devices called sensors, communicating over a wireless media. Wireless sensor networks find prospective applications in fields like environmental monitoring, healthcare, battlefield surveillance, and homeland security. A much broader spectrum of future applications is likely to follow. Deployment of WSN in hostile environments, unattended operation, openness of communication and resource constraints e.g. limited memory, energy and computational capabilities exposes WSN to a number of security attacks. The resource constrained nature of WSN makes conventional security mechanisms incongruous to apply. In this paper, an In-Band wormhole attack on a wireless sensor network is studied, in which an adversary creates a link between two regions of the network by using colluding network nodes. The impact of an In-Band wormhole attack on data transmission and energy consumption in the network is studied and a reactive recovery mechanism to detect and mitigate the Denial Of Service effect caused due to it is presented. Keywords: Wireless Sensor Networks, Wormhole, Denial of Service, Routing Attacks, In-Band Wormhole. 1. Introduction 1 Typically Wireless Sensor Networks are formed of large number of multifunctional resource constrained devices with sensing, data processing and data forwarding capabilities. When compared to other wireless networks, for example, cellular systems and Mobile Adhoc networks, sensor networks are matchlessly characterized by certain features like Dense Node Deployment, application Specific nature, unattended operation, Many - to - One Traffic Pattern, data redundancy etc and are resource constrained with low energy, limited memory and computational capabilities. Due to such type of network characteristics, security objectives are hard and challenging to achieve in wireless sensor networks. Such network characteristics make wireless sensor networks susceptible to various types of security attacks which exploit the fundamental security requirements i.e. confidentiality, authenticity and availability. This paper focuses on denial of service caused due to an In-Band wormhole attack in Wireless Sensor Networks. Wormhole attack is one of the most devastating routing attacks in WSN that is hard to detect and defend (Prasannajit B et.al 2010),(Karlof et.al, 2003). In this attack, a compromised node receives packets at one location of network and tunnels them to another location where the packets are replayed. This attack considerably tribulates a number of network protocols in terms of energy efficiency, routing, localization, service availability *Corresponsing author: Najma Farooq etc. The basic stark feature of wormhole attack lies in the fact that the attackers can easily launch an effective attack without understanding the protocols or cryptographic mechanisms used in the network. Based upon the technique which is used to launch the attack, Wormhole attacks can be classified (Khalil et.al 2007) as shown in the figure 1 Fig 1 shows the classification of wormhole attack based upon the technique used to launch the attack. 1.1 Wormhole using Packet Encapsulation In encapsulation-based wormhole attack, each packet is routed via the legitimate path only, when received by the wormhole end data packets are encapsulated and forwarded via wormhole link ,The packet is brought into original form by the second wormhole end point 1.2 Wormhole using Out-of-Band Channel In this attack the wormhole attack is propelled by having a high-quality, single-hop, out-of-band link between the malicious nodes. This type of attack needs specialized hardware capability. When an adversary creates a