An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks

Guowei Wu1, Xiaojie Chen1, Lin Yao1, Youngjun Lee2 and Kangbin Yim2

  1. School of Software, Dalian University of Technology
    Dalian, 116620 China
    wgwdut@dlut.edu.cn, 747070908@qq.com, yaolin yl@hotmail.com
  2. Dept. of Information Security Engineering, Soonchunhyang University
    Asan, 336-745 Korea
    dog3hk@gmail.com, yim@sch.ac.kr

Abstract

Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially destructive wormhole attack, in which the network topology is completely destroyed. Existing some solutions to detect wormhole attacks require special hardware or strict synchronized clocks or long processing time. Moreover, some solutions cannot even locate the wormhole. In this paper, a wormhole attack detection method is proposed based on the transmission range that exploits the local neighborhood information check without using extra hardware or clock synchronizations. Extensive simulations are conducted under different mobility models. Simulation results indicate that the proposed method can detect wormhole attacks effectively and efficiently in WSNs.

Key words

wormhole attacks, wireless sensor network, local neighborhood, network topology

Digital Object Identifier (DOI)

https://doi.org/10.2298/CSIS130921068W

Publication information

Volume 11, Issue 3 (August 2014)
Special Issue on Mobile Collaboration Technologies and Internet Services
Year of Publication: 2014
ISSN: 1820-0214 (Print) 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Wu, G., Chen, X., Yao, L., Lee, Y., Yim, K.: An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks. Computer Science and Information Systems, Vol. 11, No. 3, 1127–1141. (2014)