CFP last date
20 June 2024
Reseach Article

A Novel Approach to Detect and Prevent Wormhole Attack in Wireless Sensor Network

by Rahul Patidar, Ritu Tandon
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 11
Year of Publication: 2015
Authors: Rahul Patidar, Ritu Tandon
10.5120/20196-2436

Rahul Patidar, Ritu Tandon . A Novel Approach to Detect and Prevent Wormhole Attack in Wireless Sensor Network. International Journal of Computer Applications. 115, 11 ( April 2015), 19-23. DOI=10.5120/20196-2436

@article{ 10.5120/20196-2436,
author = { Rahul Patidar, Ritu Tandon },
title = { A Novel Approach to Detect and Prevent Wormhole Attack in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 11 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number11/20196-2436/ },
doi = { 10.5120/20196-2436 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:54:33.821188+05:30
%A Rahul Patidar
%A Ritu Tandon
%T A Novel Approach to Detect and Prevent Wormhole Attack in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 11
%P 19-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In our previous study [1] we discussed about Wireless Sensor Network (WSN) and also about wormhole attacks, those are possible in wireless sensor network. In this presented work the previously performed work is extended to find an optimum solution for the wormhole link prevention in the wireless sensor network. The proposed technique discover alternative route to the target node. Because the shortest path can has the malicious attacker. The implementation of the secure route discovery protocol is performed using NS2 and by modification of the AODV routing protocol. Finally the performance of the protocol is measured in terms of throughput. That demonstrates the effectiveness of the presented routing protocol.

References
  1. Rahul Patidar & Prof. Ritu Tandon, "A Survey of Wireless Sensor Network from Wormhole Security", National Conference on Advances in Computer Science & Technology, ACST-2014.
  2. John A. Stankovic, Wireless Sensor Networks, Department of Computer Science University of Virginia Charlottesville, Virginia 22904,June 19, 2006.
  3. Peng Ning and Kun Sun, Computer Science Department, North Carolina State University, A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols.
  4. L. Hu and D. Evans, Using Directional Antennas to Prevent Wormhole Attacks. In Proceedings of the IEEE Symposium on Network and Distributed System Security (NDSS), 2004.
  5. Y. Hu, A. Perring, and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In Proceedings of 22nd Annual Conference of the IEEE Computer and Communication Societies, Vol. 3, April 2003. pp. 1976-1986.
  6. A. Pirzada, and C. McDonald. Circumventing Sinkholes and Wormholes in Wireless Sensor Networks. International Work-shop on Wireless Ad Hoc networks, 2005(5):pp. 132-150.
  7. D. Sheela, Nirmala. S, Sangita Nath and Dr. G Mahadevan, "A Recent Technique to Detect Sink Hole Attacks in WSN".
  8. Y. Hu, A. Perrig, D. Johnson, Packet leashes: A defense against wormhole attacks in wireless ad hoc networks, INFOCOM 2003.
  9. Waqqas Sharif & Christopher Leckie, Department of Computer Science and Software Engineering The University of Melbourne Christopher Leckie, New Variants of Wormhole Attacks for Sensor Networks.
  10. Kui Ren, Wenjing Lou, Yanchao Zhang, LEDS: Providing Location-aware End-to-end Data Security in Wireless Sensor Networks,
  11. Y. C. Hu, A. Perrig, and D. B. Johnson, "Wormhole Attacks in Wireless Networks," In IEEE JSAC, Vol. 24, No. 2, Feb. 2006. pp. 370-380.
  12. Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker, "Mitigating Routing Misbehavior in Mobile and Ad Hoc Networks," In Proc. Of International Conference on Mobile Computing and Networking (Mobicom), 2000, pp. 255-265.
  13. Devendra Singh Kushwaha, Ashish Khare, J. L . Rana, PhD, "Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET", International Journal of Computer Applications (0975 – 8887) Volume 62– No. 7, January 2013.
  14. Anupama Sahu, Eduardo B. Fernandez, MihaelaCardei and Michael VanHilst, "A Pattern for a Sensor Node", Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University, Boca Raton, FL 33431.
  15. Aashima Singla, Ratika Sachdeva, Review on Security Issues and Attacks in Wireless Sensor Networks, Volume3, Issue4, April-2013 ISSN: 2277.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Security Wormhole AODV.