CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

Transmission Time based Detection of Wormhole Attack in Wireless Sensor Networks

Published on August 2012 by S. Sharmila, G. Umamaheswari
Information Processing and Remote Computing
Foundation of Computer Science USA
IPRC - Number 1
August 2012
Authors: S. Sharmila, G. Umamaheswari

S. Sharmila, G. Umamaheswari . Transmission Time based Detection of Wormhole Attack in Wireless Sensor Networks. Information Processing and Remote Computing. IPRC, 1 (August 2012), 31-34.

author = { S. Sharmila, G. Umamaheswari },
title = { Transmission Time based Detection of Wormhole Attack in Wireless Sensor Networks },
journal = { Information Processing and Remote Computing },
issue_date = { August 2012 },
volume = { IPRC },
number = { 1 },
month = { August },
year = { 2012 },
issn = 0975-8887,
pages = { 31-34 },
numpages = 4,
url = { /specialissues/iprc/number1/8001-1010/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Special Issue Article
%1 Information Processing and Remote Computing
%A S. Sharmila
%A G. Umamaheswari
%T Transmission Time based Detection of Wormhole Attack in Wireless Sensor Networks
%J Information Processing and Remote Computing
%@ 0975-8887
%N 1
%P 31-34
%D 2012
%I International Journal of Computer Applications

The open nature of wireless communication channels, lack of infrastructure and fast deployment practices make vulnerable to wide range of routing attacks. One of the most popular attacks is wormhole attack. The transmission time based detection of wormhole attack is proposed and is simulated in Network simulator (ns-2). The detection accuracy of the network is analyzed. The proposed method does not require any specific hardware.

  1. Chris Karlof and David Wagner, "Securing routing in Wireless Sensor Networks: Attacks and countermeasures", Elsevier's Ad hoc Networks J. , vol. 2-3, pp. 293-315, Sep. 2003.
  2. Y. Hu, A. Perring, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," in Proc. 22nd Annu. Conf. IEEE Computer and Communication Society, 2003, pp. 1976-198.
  3. W. Wang and B. Bhargava,"Visualization of wormholes in sensor networks," in Proc. ACM Workshop on Wireless Security (WiSe), 2004, pp. 51-60.
  4. L. Laos, R. Poovendran, C. Meadows, P. Syverson and W. Chang, "Preventing Wormhole attacks on Wireless Ad Hoc Networks: A graph Theoretic Approach," in IEEE. Conf. Wireless Communications and networking, vol 2, pp. 1193-1199, 2005.
  5. Cagalj, M. Capkun, S. Hubaux, J. -P, "Wormhole based Antijamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing , vol. 6 , pp. 100-114,2007
  6. Zaw Tun and Aung Htein Maw,"Wormhole attack detection in Wireless sensor networks", World Academy of Science, Engineering and Technology, vol. 46, pp 545-550, 2008.
  7. Majid Khabbazian , Hugues Mercier and Vijay K Bhargava, "Severity analysis and counter measures for the Wormhole attack in Wireless Ad hoc networks," IEEE Trans. Wireless Communications, vol. 8, pp. 736-745, Feb. 2009.
  8. Zhibin Zhao, Bo Wei, Xiaomei Dong , Lan Yao , Fuxiang Gao , "Detecting Wormhole attacks in Wireless Sensor Networks with Statistical Analysis", WASE Int. Conf. Information Engineering, pp. 251-254.
  9. Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li and Xiangke Liao, "Topological Detection on Wormholes in Wireless Ad Hoc and SensorNetworks," IEEE/ACM Trans. Networking, vol. 19, pp. 1787-1796, 2011.
Index Terms

Computer Science
Information Sciences


Routing Attacks Time Wireless Sensor Networks Wormhole Attack