Skip to main content

Defenses Against Wormhole Attacks in Wireless Sensor Networks

  • Conference paper
  • First Online:
Network and System Security (NSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Included in the following conference series:

Abstract

Based on analyzing the characteristics of wormhole attacks in the wireless sensor networks, this paper proposes two kinds of defense strategies, which are based on monitoring neighbor node and node location information, in order to achieve effective defense against wormhole attacks using packet encapsulation. We simulate the running state of the static wireless sensor network under normal conditions and under the wormhole attack by using OMNeT++ simulation platform. And the network running process under wormhole attack is simulated in the case of applying the defense strategy based on monitoring neighbor node and the defense strategy based on node location information respectively. By analyzing the specific defense effect, the simulation results highlight the effectiveness of the proposed defense strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Raju, I., Parwekar, P.: Detection of sinkhole attack in wireless sensor network. In: Satapathy, S.C., Raju, K.Srujan, Mandal, J.K., Bhateja, V. (eds.) Proceedings of the Second International Conference on Computer and Communication Technologies. AISC, vol. 381, pp. 629–636. Springer, New Delhi (2016). doi:10.1007/978-81-322-2526-3_65

    Chapter  Google Scholar 

  2. Teng, J., Gu, W., Xuan, D.: Defending against physical attacks in wireless sensor networks. In: Sajal, K., Krishna, K., Zhang, N. (eds.) Handbook on Securing Cyber-physical Critical Infrastructure, pp. 251–279. Elsevier, Tokyo (2012), doi:10.1016/B978-0-12-415815-3.00054-6

  3. Obaidat, M.S., Woungang, I., Dhurandher, S.K., Koo, V.: Preventing packet dropping and message tampering attacks on AODV-based mobile ad hoc networks. In: 2012 International Conference on Computer, Information and Telecommunication Systems, pp. 1–5. IEEE Press, New York (2012), doi:10.1109/CITS.2012.6220366

  4. Marco, T., Guglielmo, D.D., Dini, G., Anastasi, G.: SAD-SJ: a self-adaptive decentralized solution against selective jamming attack in wireless sensor networks. In: 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation. IEEE Press, pp. 1–8 (2013). doi:10.1109/ETFA.2013.6648037

  5. Pandey, R.: Wormhole attack in wireless sensor network. Int. J. Comput. Netw. Commun. Secur. 2(1), 22–26 (2014)

    Google Scholar 

  6. Dhanalakshmi, G.T., Bharathi, N., Monisha, M.: Safety concerns of sybil attack in WSN. In: 2014 International Conference on Science Engineering and Management Research, pp. 1–4. IEEE Press, New York (2014). doi:10.1109/ICSEMR.2014.7043659

  7. Magotra, S., Kumar, K.: Detection of hello flood attack on leach protocol. In: 2014 IEEE International Advance Computing Conference, pp. 193–198. IEEE Press, New York (2014). doi:10.1109/IAdCC.2014.6779319

  8. Wazid, M., Katal, A., Sachan, S.R., Goudar, R.H., Singh, D.P.: Detection and prevention mechanism for blackhole attack in wireless sensor network. In: 2013 International Conference on Communications and Signal Processing, pp. 576–581. IEEE Press (2013). doi:10.1109/iccsp.2013.6577120

  9. Gorrieri, A., Ferrari, G.: Irresponsible AODV Routing. J. Veh. Commun. 2(1), 47–57 (2015). doi:10.1016/j.vehcom.2015.01.002

    Google Scholar 

  10. Chen, K.: Performance evaluation by simulation and analysis with applications to computer networks. Wiley, Hoboken (2015)

    Book  Google Scholar 

Download references

Acknowledgment

This work was supported by National Key R&D Program of China (No. 2016YFB0800700).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ke Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ma, R., Chen, S., Ma, K., Hu, C., Wang, X. (2017). Defenses Against Wormhole Attacks in Wireless Sensor Networks. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics