scholarly journals WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks

2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Rupinder Singh ◽  
Jatinder Singh ◽  
Ravinder Singh

Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time delay probability and packet loss probability of the established path in order to find the value of wormhole presence probability. The nodes in the path are given different ranking and subsequently colors according to their behavior. The most striking feature of WRHT consists of its capacity to defend against almost all categories of wormhole attacks without depending on any required additional hardware such as global positioning system, timing information or synchronized clocks, and traditional cryptographic schemes demanding high computational needs. The experimental results clearly indicate that the proposed technique has significant improvement over the existing wormhole attack detection techniques.

2012 ◽  
pp. 226-238
Author(s):  
Sohail Anwar ◽  
Chongming Zhang

Wireless Sensor Networks (WSNs) have experienced an amazing evolution during the last decade. Compared with other wired or wireless networks, wireless sensor networks extend the range of data collection and make it possible for us to get information from every corner of the world. The chapter begins with an introduction to WSNs and their applications. The chapter recognizes event detection as a key component for WSN applications. The chapter provides a structured and comprehensive overview of various techniques used for event detection in WSNs. Existing event detection techniques have been grouped into threshold based and pattern based mechanisms. For each category of event detection mechanism, the chapter surveys some representative technical schemes. The chapter also provides some analyses on the relative strengths and weaknesses of these technical schemes. Towards the end, the trends in the research regarding the event detection in WSNs are described.


2017 ◽  
Vol 10 (7) ◽  
pp. 89-96
Author(s):  
Manpreet Kaur ◽  
Gulshan Kumar ◽  
Mritunjay Kumar Rai ◽  
Rahul Saha ◽  
Hye-jin Kim

Author(s):  
Zhukabayeva T.K., Mardenov E.M.,PhD

Wireless sensor networks (WSN), consisting of wireless sensors and control devices and methods of self-organization using intelligent algorithms, demonstrate broad prospects. WSNs are subject to numerous types of threats and attacks. One of which is a wormhole attack. This article provides an overview of wormhole attack detection methods in WSN, as well as a new optimized method for detecting this attack. The detection method is based on the removal of the edges of the wormhole and causes significant changes in the length of the shortest paths between network nodes.The accuracy of the proposed algorithm is not affected by the number of wormholes


Sign in / Sign up

Export Citation Format

Share Document