Abstract
Wireless sensor networks are different from mobile ad hoc networks and vehicular ad hoc networks in terms of resource capacity and applications. Sensor nodes are deployed densely in the given area. Nodes are not personally monitored. Once deployed, they are unattended. Therefore, primary requirement for sensor network is security. Possible attacks for wireless sensor networks include jamming, selective forwarding, wormhole, Sybil, etc. Wormhole is very harmful attack for sensor network, and it creates many more attacks. For dynamic wireless sensor networks, two nodes P and Q located in different area can become one hop neighbours after some amount of time. Nodes connected through tunnel will increase the number of neighbouring nodes. In this research, we present the results of an experimental analysis of measuring neighbourhood change in the presence of wormholes in dynamic WSNs with varying speeds and varying time interval.
Keyword
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Misra S, Singh S (2012) Localized policy-based target tracking using wireless sensor networks, ACM Trans Sens Netw 3(27):1–30
Misra S, Chatterjee S (2014) Social choice considerations in cloud-assisted WBAN architecture for post-disaster healthcare: data aggregation and channelization. Inf Sci 284:95–117
Kar P, Roy A, Misra S, Obaidat MS (2015) Energy-efficient connectivity re-establishment in WSN in the presence of dumb nodes. In: Proceedings of IEEE ICC 2015—4th IEEE international workshop on smart communication protocols and algorithms (SCPA 2015), London, UK, pp 8–12
Roy A, Kar P, Misra S, Obaidat MS (2015) D3: distributed approach for the detection of dumb nodes in wireless sensor networks. Int J Commun Syst. https://doi.org/10.1002/dac.2913
Manish. Patel., Akshai. Agarwal.: Security Attacks in Wireless Sensor Networks: A Survey, Proceedings of the IEEE International Conference on Intelligent Systems and Signal Processing (2013)
Misra S, Goswami S, Taneja C, Mukherjee A (2014) Design and implementation analysis of a public key infrastructure-enabled security framework for zigbee sensor networks. Int J Commun Syst. https://doi.org/10.1002/dac.2893
Zhang Z, Li P, Wu F, Deng J (2015) Double edge-based trackback for wireless sensor networks, Int J Commun Netw Distrib Syst 15(1):107–126
Boukhlouf D, Kazar O, Kahloul L (2016) Network security: distributed intrusion detection system using mobile agent technology. Int J Commun Netw Distrib Syst 17(4):335–347
Nitesh K, Jana PK (2016) Distributed fault detection and recovery algorithms in two-tier wireless sensor networks. Int J Commun Netw Distrib Syst 16(3):281–286
Das AK (2015) An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks. Int J Commun Netw Distrib Syst 15(1):22–60
Chatterjee S, Das AK (2015) A secure and effective access control scheme for distributed wireless sensor networks. Int J Commun Netw Distrib Syst 14(1):40–73
Tripathy S (2013) ESF: an efficient security framework for wireless sensor network. Int J Commun Netw Distrib Syst 10(2):176–194
Yan L (2009) Game theoretic packet relaying model for wireless ad hoc networks. Int J Commun Netw Distrib Syst 3(1):68–89
Misra S, Singh R, Mohan SVR (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using fuzzy inference system. Sensors 10(4):3444–3479
Misra S, Dhurandher SK, Rayankula A, Agrawal D (2010) Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. Comput Electr Eng 36(2):367–382
Misra S, Krishna P, Abraham K, Sasikumar N, Fredun S (2010) An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks. Comput Math Appl 60(2):294–306
Misra S, Ghosh A, Sagar AP, Obaidat MS (2010) Detection of identity-based attacks in wireless sensor networks using signalprints. In: Proceedings of the 2010 IEEE/ACM international conference on green computing and communications (GreenCom 2010), Hangzhou, China, pp 35–41
Dhurandher S, Misra S, Agrawal D, Rayankula A (2008) Using honey nodes along with channel surfing for defense against jamming attacks in wireless networks. In: Proceedings of the 3rd international conference on systems and networks communications (ICSNC 2008), Sliema, Malta, 26–31, pp 197–201
Singh R, Singh J, Singh R (2016) WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Hindawi Publishing Corporation. Mobile Information Systems, Volume, Article ID 8354930, pp 13
Chiu HS, Lui KS (2016) DEPHI: wormhole detection mechanism for ad hoc wireless networks. In: Proceedings of the IEEE 1st international symposium on wireless pervasive computing, pp 1–6
Ji S, Chen T, Zhong S (2015) Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans Mob Comput 14(3):660–674
Mukherjee S, Chattopadhyay M, Chattopadhyay S, Kar P (2016) Wormhole detection based on ordinal MDS using RTT in wireless sensor network. J Comput Netw Commun, Article ID 3405264:15
Hai TH, Huh E-N, Jo M (2009) A lightweight intrusion detection framework for wireless sensor networks. Wirel Commun Mob Comput 10:559–572
Anwar RW, Bakhtiari M, Zainal A, Abdullah AH, Qureshi KN (2015) Enhanced trust aware routing against wormhole attacks in wireless sensor networks. Int Conf Smart Sens Appl
Khalil I, Bagchi S, Shroff NB (2008) MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. J Ad Hoc Netw 6:344–362
Qazi S, Raad R, Mu Y, Susilo W (2013) Securing DSR against wormhole attacks in multirate ad hoc networks. J Netw Comput Appl 582–593
Patel M, Aggarwal A, Chaubey N (2016) Two phase wormhole attack detection in dynamic wireless sensor networks. In: IEEE international conference on wireless communications signal processing and networking, 23–25 March, Chennai, India
Patel M, Aggarwal A, Chaubey N (2018) Detecting wormhole attack in mobility based wireless sensor networks. Int J Commun Netw Distrib Syst 21(2)
Patel MM, Agarwal A, Chaubey N (2017) Wormhole attacks and countermeasures in wireless sensor networks: a survey. Int J Eng Technol 9(2):1049–1060
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, M., Aggarwal, A., Chaubey, N. (2021). Experimental Analysis of Measuring Neighbourhood Change in the Presence of Wormhole in Mobile Wireless Sensor Networks. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-15-4474-3_37
Download citation
DOI: https://doi.org/10.1007/978-981-15-4474-3_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4473-6
Online ISBN: 978-981-15-4474-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)