Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 507))

Abstract

Implementation of wireless indicator network is mainly in aggressive surroundings like army fight field, environment monitoring, atomic energy vegetation, focus on monitoring, seismic monitoring, fire and overflow recognition, etc., where continuous monitoring and real-time reaction are of innovator need. A wireless signal program has a preferable number of signal nodes that are connected mutually each distinctive easily. These signal nodes are used to sense and assess the heterogeneous factors, such as ecological stress, heat range, wetness, ground beauty products and heat, and therefore, it is very persevering to secure from the various attacks. Being restricted by sources are battery power or energy, memory potential and computational energy; these techniques are vulnerable against various types of inner and external attacks. One such challenge of attack is wormhole attack, where attackers create a postponement in between the two points in the program. In this paper, the recommended method discovers and furthermore prevents wormhole attack in wireless signal techniques. The recommended strategy uses stations information of nodes in program and uses Euclidean distance system to further recognize and restrain wormhole attack and make the connections at intervals signal nodes more secured and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. “MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks,” by I. Khalil, S. Bagchi, and N.B. Shroff, in Elsevier Ad Hoc Networks, vol. 6, no. 3, pp. 344−62, 2008.

    Google Scholar 

  2. PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK” by Dhara Buch and Devesh Jinwala, in International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011.

    Google Scholar 

  3. “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”, by Hon Sun Chiu King-Shan Lui, in International Symposium on Wireless Pervasive Computing ISWPC, 2006.

    Google Scholar 

  4. “Serloc: Secure range-independent localization for wireless sensor networks,” by L. Lazos and R. Poovendran, in Proceedings of the ACM Workshop on Wireless Security, pp. 21−30, Oct. 2004.

    Google Scholar 

  5. “Detection of Wormhole Attacks in Wireless Sensor Network”, by Dhara Buch and Devesh Jinwala in Proc. of Int. Conference on Advances in Recent Technologies in Communication and Computing, IEEE, 2011.

    Google Scholar 

  6. “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks”, by Y. C. Hu, A. Perrig and D. B. Johnson, in 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 1976–1986, 2003.

    Google Scholar 

  7. “Using directional antennas to prevent wormhole attacks,” L. Hu and D. Evans, in Proceedings of Network and Distributed System Security Symposium, pp. 131−41, Feb. 2004.

    Google Scholar 

  8. “SLAW: Secure Localization Against Wormhole Attacks Using Conflicting Sets”, by Honglong Chen, WeiLou, Xice Sunand ZhiWang, in Technical Report, The Hong Kong Polytechnic University, pp. 1– 11, 2010.

    Google Scholar 

  9. “MOBIWORP: Mitigation of the Wormhole Attack” by Khalil, Saurabh Bagchiand Ness B. Shroff, in Mobile Multihop Wireless Networks in Ad-Hoc Networks, vol. 6, no. 3, pp. 344–362, 2008.

    Google Scholar 

  10. “Detecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Networks ”, Na i t F a r i dNait-Abdesselam, Brahim Bensaou and TarikTaleb, in proceeding of Wireless Communications and Networking Conference, pp. 3117–3122, 2007.

    Google Scholar 

  11. “A Secure Localization Approach against Wormhole Attacks Using Distance Consistency” Honglong Chen, Wei Lou, XiceSunand and ZhiWang in Hindawi Publishing Corporation EURASIP Journalon Wireless Communications and Networking, vol. 2010, 11 pages, 2010.

    Google Scholar 

  12. “TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks”, Van Tran, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee and Heejo Lee, in 4th IEEE conference on Consumer Communications and Networking Conference, pp. 593–598, 2007.

    Google Scholar 

  13. “Visualization of wormholes in sensor networks,” by W. Wang and B. Bhargava, in WiSe′04, Proceedings of the 2004 ACM workshop on Wireless security. ACM Press, pp. 51−60, 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swarna Mahesh Naidu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Naidu, S.M., Himaja, V.B. (2017). Handling Wormhole Attacks in WSNs Using Location Based Approach. In: Satapathy, S., Prasad, V., Rani, B., Udgata, S., Raju, K. (eds) Proceedings of the First International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore. https://doi.org/10.1007/978-981-10-2471-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2471-9_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2470-2

  • Online ISBN: 978-981-10-2471-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics