Abstract
Implementation of wireless indicator network is mainly in aggressive surroundings like army fight field, environment monitoring, atomic energy vegetation, focus on monitoring, seismic monitoring, fire and overflow recognition, etc., where continuous monitoring and real-time reaction are of innovator need. A wireless signal program has a preferable number of signal nodes that are connected mutually each distinctive easily. These signal nodes are used to sense and assess the heterogeneous factors, such as ecological stress, heat range, wetness, ground beauty products and heat, and therefore, it is very persevering to secure from the various attacks. Being restricted by sources are battery power or energy, memory potential and computational energy; these techniques are vulnerable against various types of inner and external attacks. One such challenge of attack is wormhole attack, where attackers create a postponement in between the two points in the program. In this paper, the recommended method discovers and furthermore prevents wormhole attack in wireless signal techniques. The recommended strategy uses stations information of nodes in program and uses Euclidean distance system to further recognize and restrain wormhole attack and make the connections at intervals signal nodes more secured and efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
“MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks,” by I. Khalil, S. Bagchi, and N.B. Shroff, in Elsevier Ad Hoc Networks, vol. 6, no. 3, pp. 344−62, 2008.
“PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK” by Dhara Buch and Devesh Jinwala, in International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011.
“DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”, by Hon Sun Chiu King-Shan Lui, in International Symposium on Wireless Pervasive Computing ISWPC, 2006.
“Serloc: Secure range-independent localization for wireless sensor networks,” by L. Lazos and R. Poovendran, in Proceedings of the ACM Workshop on Wireless Security, pp. 21−30, Oct. 2004.
“Detection of Wormhole Attacks in Wireless Sensor Network”, by Dhara Buch and Devesh Jinwala in Proc. of Int. Conference on Advances in Recent Technologies in Communication and Computing, IEEE, 2011.
“Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks”, by Y. C. Hu, A. Perrig and D. B. Johnson, in 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 1976–1986, 2003.
“Using directional antennas to prevent wormhole attacks,” L. Hu and D. Evans, in Proceedings of Network and Distributed System Security Symposium, pp. 131−41, Feb. 2004.
“SLAW: Secure Localization Against Wormhole Attacks Using Conflicting Sets”, by Honglong Chen, WeiLou, Xice Sunand ZhiWang, in Technical Report, The Hong Kong Polytechnic University, pp. 1– 11, 2010.
“MOBIWORP: Mitigation of the Wormhole Attack” by Khalil, Saurabh Bagchiand Ness B. Shroff, in Mobile Multihop Wireless Networks in Ad-Hoc Networks, vol. 6, no. 3, pp. 344–362, 2008.
“Detecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Networks ”, Na i t F a r i dNait-Abdesselam, Brahim Bensaou and TarikTaleb, in proceeding of Wireless Communications and Networking Conference, pp. 3117–3122, 2007.
“A Secure Localization Approach against Wormhole Attacks Using Distance Consistency” Honglong Chen, Wei Lou, XiceSunand and ZhiWang in Hindawi Publishing Corporation EURASIP Journalon Wireless Communications and Networking, vol. 2010, 11 pages, 2010.
“TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks”, Van Tran, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee and Heejo Lee, in 4th IEEE conference on Consumer Communications and Networking Conference, pp. 593–598, 2007.
“Visualization of wormholes in sensor networks,” by W. Wang and B. Bhargava, in WiSe′04, Proceedings of the 2004 ACM workshop on Wireless security. ACM Press, pp. 51−60, 2004.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Naidu, S.M., Himaja, V.B. (2017). Handling Wormhole Attacks in WSNs Using Location Based Approach. In: Satapathy, S., Prasad, V., Rani, B., Udgata, S., Raju, K. (eds) Proceedings of the First International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore. https://doi.org/10.1007/978-981-10-2471-9_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-2471-9_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2470-2
Online ISBN: 978-981-10-2471-9
eBook Packages: EngineeringEngineering (R0)