International Conference on Critical Infrastructure Protection

ICCIP 2007: Critical Infrastructure Protection pp 267-279

Detecting Wormhole Attacks in Wireless Sensor Networks

  • Yurong Xu
  • Guanling Chen
  • James Ford
  • Fillia Makedon
Conference paper

DOI: 10.1007/978-0-387-75462-8_19

Volume 253 of the book series IFIP International Federation for Information Processing (IFIPAICT)

Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which detects wormholes based on the distortions they create in a network. Since wormhole attacks are passive in nature, the algorithm uses a hop counting technique as a probe procedure, reconstructs local maps for each node, and then uses a “diameter” feature to detect abnormalities caused by wormholes. The main advantage of the algorithm is that it provides the locations of wormholes, which is useful for implementing countermeasures. Simulation results show that the algorithm has low false detection and false toleration rates.

Keywords: Wireless sensor networks, wormhole detection, distributed algorithm

Download to read the full conference paper text

Copyright information

© International Federation for Information Processin 2008

Authors and Affiliations

  • Yurong Xu
    • 1
  • Guanling Chen
    • 2
  • James Ford
    • 3
  • Fillia Makedon
    • 3
  1. 1.Dartmouth CollegeHanoverUSA
  2. 2.Computer ScienceUniversity of Massachusetts-LowellLowellUSA
  3. 3.Computer Science and EngineeringUniversity of Texas at ArlingtonArlingtonUSA