Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Transmission Time based Detection of Wormhole Attack in Wireless Sensor Networks

Print
PDF
IJCA Special Issue on Information Processing and Remote Computing
© 2012 by IJCA Journal
IPRC - Number 1
Year of Publication: 2012
Authors:
S. Sharmila
G. Umamaheswari

S Sharmila and G Umamaheswari. Article: Transmission Time based Detection of Wormhole Attack in Wireless Sensor Networks. IJCA Special Issue on Information Processing and Remote Computing IPRC(1):31-34, August 2012. Full text available. BibTeX

@article{key:article,
	author = {S. Sharmila and G. Umamaheswari},
	title = {Article: Transmission Time based Detection of Wormhole Attack in Wireless Sensor Networks},
	journal = {IJCA Special Issue on Information Processing and Remote Computing},
	year = {2012},
	volume = {IPRC},
	number = {1},
	pages = {31-34},
	month = {August},
	note = {Full text available}
}

Abstract

The open nature of wireless communication channels, lack of infrastructure and fast deployment practices make vulnerable to wide range of routing attacks. One of the most popular attacks is wormhole attack. The transmission time based detection of wormhole attack is proposed and is simulated in Network simulator (ns-2). The detection accuracy of the network is analyzed. The proposed method does not require any specific hardware.

References

  • Chris Karlof and David Wagner, "Securing routing in Wireless Sensor Networks: Attacks and countermeasures", Elsevier's Ad hoc Networks J. , vol. 2-3, pp. 293-315, Sep. 2003.
  • Y. Hu, A. Perring, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," in Proc. 22nd Annu. Conf. IEEE Computer and Communication Society, 2003, pp. 1976-198.
  • W. Wang and B. Bhargava,"Visualization of wormholes in sensor networks," in Proc. ACM Workshop on Wireless Security (WiSe), 2004, pp. 51-60.
  • L. Laos, R. Poovendran, C. Meadows, P. Syverson and W. Chang, "Preventing Wormhole attacks on Wireless Ad Hoc Networks: A graph Theoretic Approach," in IEEE. Conf. Wireless Communications and networking, vol 2, pp. 1193-1199, 2005.
  • Cagalj, M. Capkun, S. Hubaux, J. -P, "Wormhole based Antijamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing , vol. 6 , pp. 100-114,2007
  • Zaw Tun and Aung Htein Maw,"Wormhole attack detection in Wireless sensor networks", World Academy of Science, Engineering and Technology, vol. 46, pp 545-550, 2008.
  • Majid Khabbazian , Hugues Mercier and Vijay K Bhargava, "Severity analysis and counter measures for the Wormhole attack in Wireless Ad hoc networks," IEEE Trans. Wireless Communications, vol. 8, pp. 736-745, Feb. 2009.
  • Zhibin Zhao, Bo Wei, Xiaomei Dong , Lan Yao , Fuxiang Gao , "Detecting Wormhole attacks in Wireless Sensor Networks with Statistical Analysis", WASE Int. Conf. Information Engineering, pp. 251-254.
  • Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li and Xiangke Liao, "Topological Detection on Wormholes in Wireless Ad Hoc and SensorNetworks," IEEE/ACM Trans. Networking, vol. 19, pp. 1787-1796, 2011.