Abstract
The fast advancement of communication technologies prompted a pour of interest in wireless networks research. Application-specific networks made up of a huge amount of sensor nodes are known as wireless sensor networks. Due to the lack of a predefined network structure, they are open to a variety of attacks. WSNs are made up of several types of sensor nodes, and they can be subjected to a variety of network layer attacks. There is most devastating routing attacks for wireless sensor network is the Wormhole Attack. In a wormhole attack, the attacker node attracts data packet as it is being transferred from one base station to another. A wormhole attack creates a virtual channel between two or more nodes in a network. Two or more nodes can send data packets across the virtual tunnel. Based on two-phase computation, this study suggested iWAD: An improved Wormhole Attack Detection System for Wireless Sensor Network. To detect susceptible nodes in network, two separate network parameters, transmission time and node buffer length, are considered. The proposed iWAD method is implemented using network simulation 2, which modifies an existing routing protocol called AODV. On the basis of resulting parameter i.e. E-to-E network delay, PDR, and throughput, the implementation result reveals that iWAD is adoptable and increases network performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fahmy, H.M.A.: Wireless Sensor Networks. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-29700-8
El Emary, I.M., Ramakrishnan, S. (eds.): Wireless Sensor Networks: From Theory to Applications. CRC Press, Boca Raton (2019)
Dani, V., Birchha, V.: Security enhancement technique for defending wormhole attacks in wireless mesh networks. Int. J. Comput. Sci. Inf. Technol. 6(4), 3943–3948 (2015)
Sinha, P., Jha, V.K., Rai, A.K., Bhushan, B.: Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: a survey. In: 2017 International Conference on Signal Processing and Communication (ICSPC), pp. 288–293. IEEE (2017)
Bhushan, B., Sahoo, G.: Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wirel. Pers. Commun. 98(2), 2037–2077 (2018)
Raghav, R.S., Thirugnansambandam, K., Anguraj, D.K.: Beeware routing scheme for detecting network layer attacks in wireless sensor networks. Wirel. Pers. Commun. 112(4), 2439–2459 (2020)
Tun, Z., Maw, A.H.: Wormhole attack detection in wireless sensor networks. World Acad. Sci. Eng. Technol. 46 (2008)
Dani, V., Birchha, V.: An improved wormhole attack detection and prevention method for wireless mesh networks. Int. J. Adv. Res. Comput. Commun. Eng. 4(12) (2015)
Singh, Y., Khatkar, A., Rani, P., Barak, D.D.: Wormhole attack avoidance technique in mobile adhoc networks. In: 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), pp. 283–287. IEEE (2013)
Mahajan, V., Natu, M., Sethi, A.: Analysis of wormhole intrusion attacks in MANETS. In: MILCOM 2008–2008 IEEE Military Communications Conference, pp. 1–7. IEEE (2008)
Patel, M., Aggarwal, A., Chaubey, N.K.: Detection of wormhole attacks in mobility-based wireless sensor networks. Int. J. Commun. Netw. Distrib. Syst. 21(2), 147–156 (2018)
Pawar, M.V., Anuradha, J.: Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM. Int. J. Pervasive Comput. Commun. (2021)
Amish, P., Vaghela, V.B.: Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Comput. Sci. 79, 700–707 (2016)
Karthigadevi, K., Balamurali, S., Venkatesulu, M.: Wormhole attack detection and prevention using EIGRP protocol based on round trip time. J. Cyber Secur. Mobil., 215–228 (2018)
Patel, M., Aggarwal, A., Chaubey, N.: Performance evaluation of wireless sensor network in the presence of wormhole attack. In: Pati, B., Panigrahi, C.R., Misra, S., Pujari, A.K., Bakshi, S. (eds.) Progress in Advanced Computing and Intelligent Engineering. AISC, vol. 713, pp. 523–527. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-1708-8_48
Kumar Dwivedi, R., Sharma, P., Kumar, R.: A scheme for detection of high transmission power based wormhole attack in WSN. In: 2018 5th IEEE Uttar Pradesh section International Conference on Electrical, Electronics and Computer Engineering (UPCON), pp. 1–6. IEEE (2018)
Zardari, Z.A., Memon, K.A., Shah, R.A., Dehraj, S., Ahmed, I.: A lightweight technique for detection and prevention of wormhole attack in MANET. EAI Endorsed Trans. Scalable Inf. Syst. 8(29) (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Dani, V., Bhonde, R., Mandloi, A. (2022). iWAD: An Improved Wormhole Attack Detection System for Wireless Sensor Network. In: Abraham, A., Gandhi, N., Hanne, T., Hong, TP., Nogueira Rios, T., Ding, W. (eds) Intelligent Systems Design and Applications. ISDA 2021. Lecture Notes in Networks and Systems, vol 418. Springer, Cham. https://doi.org/10.1007/978-3-030-96308-8_93
Download citation
DOI: https://doi.org/10.1007/978-3-030-96308-8_93
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96307-1
Online ISBN: 978-3-030-96308-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)