Abstract
Based on analyzing the characteristics of wormhole attacks in the wireless sensor networks, this paper proposes two kinds of defense strategies, which are based on monitoring neighbor node and node location information, in order to achieve effective defense against wormhole attacks using packet encapsulation. We simulate the running state of the static wireless sensor network under normal conditions and under the wormhole attack by using OMNeT++ simulation platform. And the network running process under wormhole attack is simulated in the case of applying the defense strategy based on monitoring neighbor node and the defense strategy based on node location information respectively. By analyzing the specific defense effect, the simulation results highlight the effectiveness of the proposed defense strategy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Raju, I., Parwekar, P.: Detection of sinkhole attack in wireless sensor network. In: Satapathy, S.C., Raju, K.Srujan, Mandal, J.K., Bhateja, V. (eds.) Proceedings of the Second International Conference on Computer and Communication Technologies. AISC, vol. 381, pp. 629–636. Springer, New Delhi (2016). doi:10.1007/978-81-322-2526-3_65
Teng, J., Gu, W., Xuan, D.: Defending against physical attacks in wireless sensor networks. In: Sajal, K., Krishna, K., Zhang, N. (eds.) Handbook on Securing Cyber-physical Critical Infrastructure, pp. 251–279. Elsevier, Tokyo (2012), doi:10.1016/B978-0-12-415815-3.00054-6
Obaidat, M.S., Woungang, I., Dhurandher, S.K., Koo, V.: Preventing packet dropping and message tampering attacks on AODV-based mobile ad hoc networks. In: 2012 International Conference on Computer, Information and Telecommunication Systems, pp. 1–5. IEEE Press, New York (2012), doi:10.1109/CITS.2012.6220366
Marco, T., Guglielmo, D.D., Dini, G., Anastasi, G.: SAD-SJ: a self-adaptive decentralized solution against selective jamming attack in wireless sensor networks. In: 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation. IEEE Press, pp. 1–8 (2013). doi:10.1109/ETFA.2013.6648037
Pandey, R.: Wormhole attack in wireless sensor network. Int. J. Comput. Netw. Commun. Secur. 2(1), 22–26 (2014)
Dhanalakshmi, G.T., Bharathi, N., Monisha, M.: Safety concerns of sybil attack in WSN. In: 2014 International Conference on Science Engineering and Management Research, pp. 1–4. IEEE Press, New York (2014). doi:10.1109/ICSEMR.2014.7043659
Magotra, S., Kumar, K.: Detection of hello flood attack on leach protocol. In: 2014 IEEE International Advance Computing Conference, pp. 193–198. IEEE Press, New York (2014). doi:10.1109/IAdCC.2014.6779319
Wazid, M., Katal, A., Sachan, S.R., Goudar, R.H., Singh, D.P.: Detection and prevention mechanism for blackhole attack in wireless sensor network. In: 2013 International Conference on Communications and Signal Processing, pp. 576–581. IEEE Press (2013). doi:10.1109/iccsp.2013.6577120
Gorrieri, A., Ferrari, G.: Irresponsible AODV Routing. J. Veh. Commun. 2(1), 47–57 (2015). doi:10.1016/j.vehcom.2015.01.002
Chen, K.: Performance evaluation by simulation and analysis with applications to computer networks. Wiley, Hoboken (2015)
Acknowledgment
This work was supported by National Key R&D Program of China (No. 2016YFB0800700).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ma, R., Chen, S., Ma, K., Hu, C., Wang, X. (2017). Defenses Against Wormhole Attacks in Wireless Sensor Networks. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-64701-2_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64700-5
Online ISBN: 978-3-319-64701-2
eBook Packages: Computer ScienceComputer Science (R0)