An Approach Towards Detection of Wormhole Attack in Sensor Networks

  • Authors:
  • B. Prasannajit;Anupama S. Venkatesh;K. Vindhykumari;S. R. Subhashini;G. Vinitha

  • Affiliations:
  • -;-;-;-;-

  • Venue:
  • ICIIC '10 Proceedings of the 2010 First International Conference on Integrated Intelligent Computing
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

A wormhole attack’-where an attacker receives packets at one location in the network, tunnels and then replays them at another remote location in the network. The route request can be tunneled to the target area by the attacker through wormholes. Thus, the sensor nodes in the target area build the route through the attacker. Later, the attacker can tamper the data, messages, or selectively forward data messages to disrupt the functions of the network. In this paper we propose a method, first step is based on the algorithm uses a hop counting technique as a probe procedure, reconstructs local maps in each node, and then uses a “diameter"feature to detect abnormalities caused by wormholes, second step based on round trip time (RTT), neighbor numbers. The commutated RTT between two successive nodes and those nodes’ neighbor number which is needed to compare those values of other successive nodes.