Abstract
Wireless sensor networks are vulnerable to many more attacks. Wormhole attack is very dangerous to wireless sensor networks because it is a gateway to many more attacks such as black hole, gray hole, Sybil, jellyfish, denial of service. Without knowing the protocols used in the network, an attacker launches a wormhole attack by placing two malicious nodes in two different parts of the network which are far away from each other. In this way, an attacker tries to disturb the routing process. An attacker can drop the packets, modify the packets, and analyze the traffic. In this paper, we have proposed a wormhole detection method based on neighborhood information and alternate path length calculation. Simulation results show that our approach has good detection accuracy with less storage requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aboelaze, M., Aloul, F.: Current and future trends in sensor networks: a survey. In: Second IFIP International Conference on Wireless and Optical Communications Networks (2005)
Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 4, 117–125 (2009)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. J. (Spec. Issue Sens. Netw. Appl. Protoc.), 113–127 (2003)
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. IEEE Comput. Commun. Soc. IEEE 3, 1976–1986 (2003)
Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)
Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wirel. Netw. 13, 27–59 (2007)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise—tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2) (2006)
Lazos, L., Poovendran, R.: SeRLoc: robust localization for wireless sensor networks. ACM Trans. Sens. Netw., 73–100 (2005)
Lazos, L., Poovendran, R.: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 233–246 (2006)
Lu, X., Dong, D., Liao, X.: MDS-based wormhole detection using local topology in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012(Article ID 145702), 9 pp.
Buttyan, L., Dora, L., Vajda, I.: Statistical wormhole detection in sensor networks. SAS 2005, pp. 128–141. Springer
Xu, Y., Chen, G., Ford, J., Makedon, F.: Detecting wormhole attacks in wireless sensor networks. In: International Conference on Critical Infrastructure Protection, ICCIP 2007, pp. 267–279
Liu, J., Chen, H., Zhen, Z., Sha, M.: Intrusion detection algorithm for the wormhole attack in ad hoc network. In: International Conference on Computer Science and Informational Technology, pp. 147–154 (2013)
Chen, H., Lou, W., Sun, X., Wang, Z.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wirel. Commun. Netw. 2010, 11 pp.
Shokri, R., Poturalski, M.: A practical secure neighbor verification protocol for wireless sensor networks. ACM, WiSec’09, March 16–18, 2009, Zurich, Switzerland
Xu, Y., Ouyang, Y., Le, Z., Ford, J., Makedon, F.: Analysis of range-free anchor-free localization in a WSN under wormhole attack. ACM, MSWiM’07, Oct 22–26, 2007, Chania, Greece
Yadav, J., Kumar, M.: Detection of wormhole attack in wireless sensor networks. In: International Conference on ICT for Sustainable Development, pp. 243–250 (2016)
Singh, R., Singh, J., Singh, R.: WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks. Mob. Inf. Syst. 2016(Article ID 8354930), 13
Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 736–745 (2009)
Qazi, S., Raad, R., Mu, Y., Susilo, W.: Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl., 582–593 (2013)
Mukherjee, S., Chattopadhyay, M., Chattopadhyay, S., Kar, P.: Wormhole detection based on ordinal MDS using RTT in wireless sensor network. J. Comput. Netw. Commun. 2016(Article ID 3405264), 15 pp.
Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: WiSe’04, Proceeding of the 2004 ACM Workshop on Wireless Security, pp. 51–60. ACM Press (2004)
Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distrib. Sens. Netw. 2015(Article ID 356382), 16 pp.
Karapistoli, E., Sarigiannidis, P., Economides, A.A.: Visual-assisted wormhole attack detection for wireless sensor networks. In: International Conference on Security and Privacy in Communication Systems, pp. 222–238 (2015)
Acknowledgements
The authors are highly thankful to Smt. S R Patel Engineering College, Gujarat Technological University, for providing the opportunity to conduct this research work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, M., Aggarwal, A., Chaubey, N. (2019). Detection of Wormhole Attack in Static Wireless Sensor Networks. In: Bhatia, S., Tiwari, S., Mishra, K., Trivedi, M. (eds) Advances in Computer Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 760. Springer, Singapore. https://doi.org/10.1007/978-981-13-0344-9_39
Download citation
DOI: https://doi.org/10.1007/978-981-13-0344-9_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0343-2
Online ISBN: 978-981-13-0344-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)