Distributed detection of wormhole attacks in wireless sensor networks

19Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distributed intrusion detection system that monitors the communication in the network and propose a criterion for the placement of intrusion detection nodes. The intrusion detection system searches for violations of that criterion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work. © 2010 ICST Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.

Cite

CITATION STYLE

APA

De Graaf, R., Hegazy, I., Horton, J., & Safavi-Naini, R. (2010). Distributed detection of wormhole attacks in wireless sensor networks. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 28 LNICST, pp. 208–223). https://doi.org/10.1007/978-3-642-11723-7_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free