JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET

Author(s):  
Sudhir Bagade ◽  
Vijay Raisinghani
2017 ◽  
Vol 11 (1) ◽  
pp. 35-51 ◽  
Author(s):  
Mukesh Kumar ◽  
Kamlesh Dutta

Wireless networks are used by everyone for their convenience for transferring packets from one node to another without having a static infrastructure. In WSN, there are some nodes which are light weight, small in size, having low computation overhead, and low cost known as sensor nodes. In literature, there exists many secure data aggregation protocols available but they are not sufficient to detect the malicious node. The authors require a better security mechanism or a technique to secure the network. Data aggregation is an essential paradigm in WSN. The idea is to combine data coming from different source nodes in order to achieve energy efficiency. In this paper, the authors proposed a protocol for worm hole attack detection during data aggregation in WSN. Main focus is on wormhole attack detection and its countermeasures.


2013 ◽  
Vol 443 ◽  
pp. 440-445 ◽  
Author(s):  
Liang Yu Luan ◽  
Ying Fang Fu ◽  
Peng Xiao ◽  
Ling Xi Peng

In a wireless mesh network, the need for cooperation among wireless nodes to relay each others packets exposes the network to a wide range of security threats. A particularly devastating type of threats is the so-called wormhole attacks. In order to defense against the attack, a type of wormhole attack model and a watch nodes-based wormhole attack detection scheme were presented in this paper. The scheme that is based on the combination of a number of techniques, such as distributed voting, watch nodes based detection and identity-based cryptosystem. Qualitative analysis and simulation show that the wormhole attack detection scheme is more advantageous over the some of the previous schemes in terms of performance and cost.


2021 ◽  
Author(s):  
John Clement Sunder A ◽  
K.P. Sampoornam KP ◽  
R.Vinodkumar R

Abstract Detection and isolation of Sybil and wormhole attack nodes in healthcare WSN is a significant problem to be resolved. Few research works have been designed to identify Sybil and wormhole attack nodes in the network. However, the detection performance of Sybil and wormhole attack nodes was not effectual as the false alarm rate was higher. In order to overcome such limitations, Delta Ruled First Order Iterative Deep Learning based Intrusion Detection (DRFOIDL-ID) Technique is proposed. The DRFOIDL-ID Technique includes two main phase namely attack detection and isolation. The DRFOIDL-ID Technique constructs Delta Ruled First Order Iterative Deep Learning in attack detection phase with aim of detecting the occurrence of Sybil and wormhole attacks in healthcare WSN. After detecting the attack nodes, DRFOIDL-ID Technique carried outs isolation process with the objective of increasing the routing performance. During the isolation phase, DRFOIDL-ID Technique keep always the identified Sybil and wormhole attack nodes through transmitting the isolation messages to all sensor nodes in healthcare WSN. Hence, DRFOIDL-ID Technique improves the routing performance with lower packet loss rate. The DRFOIDL-ID Technique conducts the simulation process using factors such as attack detection rate, attack detection time, false alarm rate and packet loss rate with respect to a diverse number of sensor nodes and data packets. The simulation result proves that the DRFOIDL-ID Technique is able to improve the attack detection rate and also reduces the attack detection time as compared to state-of-the-art works.


Sign in / Sign up

Export Citation Format

Share Document