Skip to main content

Detection of Wormhole Attack in Static Wireless Sensor Networks

  • Conference paper
  • First Online:
Advances in Computer Communication and Computational Sciences

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 760))

Abstract

Wireless sensor networks are vulnerable to many more attacks. Wormhole attack is very dangerous to wireless sensor networks because it is a gateway to many more attacks such as black hole, gray hole, Sybil, jellyfish, denial of service. Without knowing the protocols used in the network, an attacker launches a wormhole attack by placing two malicious nodes in two different parts of the network which are far away from each other. In this way, an attacker tries to disturb the routing process. An attacker can drop the packets, modify the packets, and analyze the traffic. In this paper, we have proposed a wormhole detection method based on neighborhood information and alternate path length calculation. Simulation results show that our approach has good detection accuracy with less storage requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aboelaze, M., Aloul, F.: Current and future trends in sensor networks: a survey. In: Second IFIP International Conference on Wireless and Optical Communications Networks (2005)

    Google Scholar 

  2. Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 4, 117–125 (2009)

    Google Scholar 

  3. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. J. (Spec. Issue Sens. Netw. Appl. Protoc.), 113–127 (2003)

    Google Scholar 

  4. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. IEEE Comput. Commun. Soc. IEEE 3, 1976–1986 (2003)

    Google Scholar 

  5. Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)

    Article  Google Scholar 

  6. Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wirel. Netw. 13, 27–59 (2007)

    Google Scholar 

  7. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise—tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2) (2006)

    Google Scholar 

  8. Lazos, L., Poovendran, R.: SeRLoc: robust localization for wireless sensor networks. ACM Trans. Sens. Netw., 73–100 (2005)

    Google Scholar 

  9. Lazos, L., Poovendran, R.: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 233–246 (2006)

    Article  Google Scholar 

  10. Lu, X., Dong, D., Liao, X.: MDS-based wormhole detection using local topology in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012(Article ID 145702), 9 pp.

    Google Scholar 

  11. Buttyan, L., Dora, L., Vajda, I.: Statistical wormhole detection in sensor networks. SAS 2005, pp. 128–141. Springer

    Google Scholar 

  12. Xu, Y., Chen, G., Ford, J., Makedon, F.: Detecting wormhole attacks in wireless sensor networks. In: International Conference on Critical Infrastructure Protection, ICCIP 2007, pp. 267–279

    Google Scholar 

  13. Liu, J., Chen, H., Zhen, Z., Sha, M.: Intrusion detection algorithm for the wormhole attack in ad hoc network. In: International Conference on Computer Science and Informational Technology, pp. 147–154 (2013)

    Google Scholar 

  14. Chen, H., Lou, W., Sun, X., Wang, Z.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wirel. Commun. Netw. 2010, 11 pp.

    Google Scholar 

  15. Shokri, R., Poturalski, M.: A practical secure neighbor verification protocol for wireless sensor networks. ACM, WiSec’09, March 16–18, 2009, Zurich, Switzerland

    Google Scholar 

  16. Xu, Y., Ouyang, Y., Le, Z., Ford, J., Makedon, F.: Analysis of range-free anchor-free localization in a WSN under wormhole attack. ACM, MSWiM’07, Oct 22–26, 2007, Chania, Greece

    Google Scholar 

  17. Yadav, J., Kumar, M.: Detection of wormhole attack in wireless sensor networks. In: International Conference on ICT for Sustainable Development, pp. 243–250 (2016)

    Google Scholar 

  18. Singh, R., Singh, J., Singh, R.: WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks. Mob. Inf. Syst. 2016(Article ID 8354930), 13

    Google Scholar 

  19. Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 736–745 (2009)

    Google Scholar 

  20. Qazi, S., Raad, R., Mu, Y., Susilo, W.: Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl., 582–593 (2013)

    Google Scholar 

  21. Mukherjee, S., Chattopadhyay, M., Chattopadhyay, S., Kar, P.: Wormhole detection based on ordinal MDS using RTT in wireless sensor network. J. Comput. Netw. Commun. 2016(Article ID 3405264), 15 pp.

    Google Scholar 

  22. Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: WiSe’04, Proceeding of the 2004 ACM Workshop on Wireless Security, pp. 51–60. ACM Press (2004)

    Google Scholar 

  23. Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distrib. Sens. Netw. 2015(Article ID 356382), 16 pp.

    Google Scholar 

  24. Karapistoli, E., Sarigiannidis, P., Economides, A.A.: Visual-assisted wormhole attack detection for wireless sensor networks. In: International Conference on Security and Privacy in Communication Systems, pp. 222–238 (2015)

    Google Scholar 

Download references

Acknowledgements

The authors are highly thankful to Smt. S R Patel Engineering College, Gujarat Technological University, for providing the opportunity to conduct this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manish Patel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patel, M., Aggarwal, A., Chaubey, N. (2019). Detection of Wormhole Attack in Static Wireless Sensor Networks. In: Bhatia, S., Tiwari, S., Mishra, K., Trivedi, M. (eds) Advances in Computer Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 760. Springer, Singapore. https://doi.org/10.1007/978-981-13-0344-9_39

Download citation

Publish with us

Policies and ethics