Skip to main content

iWAD: An Improved Wormhole Attack Detection System for Wireless Sensor Network

  • Conference paper
  • First Online:
Intelligent Systems Design and Applications (ISDA 2021)

Abstract

The fast advancement of communication technologies prompted a pour of interest in wireless networks research. Application-specific networks made up of a huge amount of sensor nodes are known as wireless sensor networks. Due to the lack of a predefined network structure, they are open to a variety of attacks. WSNs are made up of several types of sensor nodes, and they can be subjected to a variety of network layer attacks. There is most devastating routing attacks for wireless sensor network is the Wormhole Attack. In a wormhole attack, the attacker node attracts data packet as it is being transferred from one base station to another. A wormhole attack creates a virtual channel between two or more nodes in a network. Two or more nodes can send data packets across the virtual tunnel. Based on two-phase computation, this study suggested iWAD: An improved Wormhole Attack Detection System for Wireless Sensor Network. To detect susceptible nodes in network, two separate network parameters, transmission time and node buffer length, are considered. The proposed iWAD method is implemented using network simulation 2, which modifies an existing routing protocol called AODV. On the basis of resulting parameter i.e. E-to-E network delay, PDR, and throughput, the implementation result reveals that iWAD is adoptable and increases network performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fahmy, H.M.A.: Wireless Sensor Networks. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-29700-8

  2. El Emary, I.M., Ramakrishnan, S. (eds.): Wireless Sensor Networks: From Theory to Applications. CRC Press, Boca Raton (2019)

    Google Scholar 

  3. Dani, V., Birchha, V.: Security enhancement technique for defending wormhole attacks in wireless mesh networks. Int. J. Comput. Sci. Inf. Technol. 6(4), 3943–3948 (2015)

    Google Scholar 

  4. Sinha, P., Jha, V.K., Rai, A.K., Bhushan, B.: Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: a survey. In: 2017 International Conference on Signal Processing and Communication (ICSPC), pp. 288–293. IEEE (2017)

    Google Scholar 

  5. Bhushan, B., Sahoo, G.: Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wirel. Pers. Commun. 98(2), 2037–2077 (2018)

    Article  Google Scholar 

  6. Raghav, R.S., Thirugnansambandam, K., Anguraj, D.K.: Beeware routing scheme for detecting network layer attacks in wireless sensor networks. Wirel. Pers. Commun. 112(4), 2439–2459 (2020)

    Article  Google Scholar 

  7. Tun, Z., Maw, A.H.: Wormhole attack detection in wireless sensor networks. World Acad. Sci. Eng. Technol. 46 (2008)

    Google Scholar 

  8. Dani, V., Birchha, V.: An improved wormhole attack detection and prevention method for wireless mesh networks. Int. J. Adv. Res. Comput. Commun. Eng. 4(12) (2015)

    Google Scholar 

  9. Singh, Y., Khatkar, A., Rani, P., Barak, D.D.: Wormhole attack avoidance technique in mobile adhoc networks. In: 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), pp. 283–287. IEEE (2013)

    Google Scholar 

  10. Mahajan, V., Natu, M., Sethi, A.: Analysis of wormhole intrusion attacks in MANETS. In: MILCOM 2008–2008 IEEE Military Communications Conference, pp. 1–7. IEEE (2008)

    Google Scholar 

  11. Patel, M., Aggarwal, A., Chaubey, N.K.: Detection of wormhole attacks in mobility-based wireless sensor networks. Int. J. Commun. Netw. Distrib. Syst. 21(2), 147–156 (2018)

    Google Scholar 

  12. Pawar, M.V., Anuradha, J.: Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM. Int. J. Pervasive Comput. Commun. (2021)

    Google Scholar 

  13. Amish, P., Vaghela, V.B.: Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Comput. Sci. 79, 700–707 (2016)

    Article  Google Scholar 

  14. Karthigadevi, K., Balamurali, S., Venkatesulu, M.: Wormhole attack detection and prevention using EIGRP protocol based on round trip time. J. Cyber Secur. Mobil., 215–228 (2018)

    Google Scholar 

  15. Patel, M., Aggarwal, A., Chaubey, N.: Performance evaluation of wireless sensor network in the presence of wormhole attack. In: Pati, B., Panigrahi, C.R., Misra, S., Pujari, A.K., Bakshi, S. (eds.) Progress in Advanced Computing and Intelligent Engineering. AISC, vol. 713, pp. 523–527. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-1708-8_48

    Chapter  Google Scholar 

  16. Kumar Dwivedi, R., Sharma, P., Kumar, R.: A scheme for detection of high transmission power based wormhole attack in WSN. In: 2018 5th IEEE Uttar Pradesh section International Conference on Electrical, Electronics and Computer Engineering (UPCON), pp. 1–6. IEEE (2018)

    Google Scholar 

  17. Zardari, Z.A., Memon, K.A., Shah, R.A., Dehraj, S., Ahmed, I.: A lightweight technique for detection and prevention of wormhole attack in MANET. EAI Endorsed Trans. Scalable Inf. Syst. 8(29) (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Virendra Dani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dani, V., Bhonde, R., Mandloi, A. (2022). iWAD: An Improved Wormhole Attack Detection System for Wireless Sensor Network. In: Abraham, A., Gandhi, N., Hanne, T., Hong, TP., Nogueira Rios, T., Ding, W. (eds) Intelligent Systems Design and Applications. ISDA 2021. Lecture Notes in Networks and Systems, vol 418. Springer, Cham. https://doi.org/10.1007/978-3-030-96308-8_93

Download citation

Publish with us

Policies and ethics