Wormhole attack detection in wireless sensor networks

Author(s):  
Mostefa Bendjima ◽  
Mohammed Feham
2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Rupinder Singh ◽  
Jatinder Singh ◽  
Ravinder Singh

Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time delay probability and packet loss probability of the established path in order to find the value of wormhole presence probability. The nodes in the path are given different ranking and subsequently colors according to their behavior. The most striking feature of WRHT consists of its capacity to defend against almost all categories of wormhole attacks without depending on any required additional hardware such as global positioning system, timing information or synchronized clocks, and traditional cryptographic schemes demanding high computational needs. The experimental results clearly indicate that the proposed technique has significant improvement over the existing wormhole attack detection techniques.


2017 ◽  
Vol 10 (7) ◽  
pp. 89-96
Author(s):  
Manpreet Kaur ◽  
Gulshan Kumar ◽  
Mritunjay Kumar Rai ◽  
Rahul Saha ◽  
Hye-jin Kim

Author(s):  
Zhukabayeva T.K., Mardenov E.M.,PhD

Wireless sensor networks (WSN), consisting of wireless sensors and control devices and methods of self-organization using intelligent algorithms, demonstrate broad prospects. WSNs are subject to numerous types of threats and attacks. One of which is a wormhole attack. This article provides an overview of wormhole attack detection methods in WSN, as well as a new optimized method for detecting this attack. The detection method is based on the removal of the edges of the wormhole and causes significant changes in the length of the shortest paths between network nodes.The accuracy of the proposed algorithm is not affected by the number of wormholes


2014 ◽  
Vol 11 (3) ◽  
pp. 1127-1141 ◽  
Author(s):  
Guowei Wu ◽  
Xiaojie Chen ◽  
Lin Yao ◽  
Youngjun Lee ◽  
Kangbin Yim

Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially destructive wormhole attack, in which the network topology is completely destroyed. Existing some solutions to detect wormhole attacks require special hardware or strict synchronized clocks or long processing time. Moreover, some solutions cannot even locate the wormhole. In this paper, a wormhole attack detection method is proposed based on the transmission range that exploits the local neighborhood information check without using extra hardware or clock synchronizations. Extensive simulations are conducted under different mobility models. Simulation results indicate that the proposed method can detect wormhole attacks effectively and efficiently in WSNs.


Sign in / Sign up

Export Citation Format

Share Document