Skip to main content

Experimental Analysis of Measuring Neighbourhood Change in the Presence of Wormhole in Mobile Wireless Sensor Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 52))

Abstract

Wireless sensor networks are different from mobile ad hoc networks and vehicular ad hoc networks in terms of resource capacity and applications. Sensor nodes are deployed densely in the given area. Nodes are not personally monitored. Once deployed, they are unattended. Therefore, primary requirement for sensor network is security. Possible attacks for wireless sensor networks include jamming, selective forwarding, wormhole, Sybil, etc. Wormhole is very harmful attack for sensor network, and it creates many more attacks. For dynamic wireless sensor networks, two nodes P and Q located in different area can become one hop neighbours after some amount of time. Nodes connected through tunnel will increase the number of neighbouring nodes. In this research, we present the results of an experimental analysis of measuring neighbourhood change in the presence of wormholes in dynamic WSNs with varying speeds and varying time interval.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Misra S, Singh S (2012) Localized policy-based target tracking using wireless sensor networks, ACM Trans Sens Netw 3(27):1–30

    Google Scholar 

  2. Misra S, Chatterjee S (2014) Social choice considerations in cloud-assisted WBAN architecture for post-disaster healthcare: data aggregation and channelization. Inf Sci 284:95–117

    Google Scholar 

  3. Kar P, Roy A, Misra S, Obaidat MS (2015) Energy-efficient connectivity re-establishment in WSN in the presence of dumb nodes. In: Proceedings of IEEE ICC 2015—4th IEEE international workshop on smart communication protocols and algorithms (SCPA 2015), London, UK, pp 8–12

    Google Scholar 

  4. Roy A, Kar P, Misra S, Obaidat MS (2015) D3: distributed approach for the detection of dumb nodes in wireless sensor networks. Int J Commun Syst. https://doi.org/10.1002/dac.2913

  5. Manish. Patel., Akshai. Agarwal.: Security Attacks in Wireless Sensor Networks: A Survey, Proceedings of the IEEE International Conference on Intelligent Systems and Signal Processing (2013)

    Google Scholar 

  6. Misra S, Goswami S, Taneja C, Mukherjee A (2014) Design and implementation analysis of a public key infrastructure-enabled security framework for zigbee sensor networks. Int J Commun Syst. https://doi.org/10.1002/dac.2893

  7. Zhang Z, Li P, Wu F, Deng J (2015) Double edge-based trackback for wireless sensor networks, Int J Commun Netw Distrib Syst 15(1):107–126

    Google Scholar 

  8. Boukhlouf D, Kazar O, Kahloul L (2016) Network security: distributed intrusion detection system using mobile agent technology. Int J Commun Netw Distrib Syst 17(4):335–347

    Google Scholar 

  9. Nitesh K, Jana PK (2016) Distributed fault detection and recovery algorithms in two-tier wireless sensor networks. Int J Commun Netw Distrib Syst 16(3):281–286

    Google Scholar 

  10. Das AK (2015) An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks. Int J Commun Netw Distrib Syst 15(1):22–60

    Google Scholar 

  11. Chatterjee S, Das AK (2015) A secure and effective access control scheme for distributed wireless sensor networks. Int J Commun Netw Distrib Syst 14(1):40–73

    Google Scholar 

  12. Tripathy S (2013) ESF: an efficient security framework for wireless sensor network. Int J Commun Netw Distrib Syst 10(2):176–194

    Google Scholar 

  13. Yan L (2009) Game theoretic packet relaying model for wireless ad hoc networks. Int J Commun Netw Distrib Syst 3(1):68–89

    Google Scholar 

  14. Misra S, Singh R, Mohan SVR (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using fuzzy inference system. Sensors 10(4):3444–3479

    Google Scholar 

  15. Misra S, Dhurandher SK, Rayankula A, Agrawal D (2010) Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. Comput Electr Eng 36(2):367–382

    Google Scholar 

  16. Misra S, Krishna P, Abraham K, Sasikumar N, Fredun S (2010) An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks. Comput Math Appl 60(2):294–306

    Google Scholar 

  17. Misra S, Ghosh A, Sagar AP, Obaidat MS (2010) Detection of identity-based attacks in wireless sensor networks using signalprints. In: Proceedings of the 2010 IEEE/ACM international conference on green computing and communications (GreenCom 2010), Hangzhou, China, pp 35–41

    Google Scholar 

  18. Dhurandher S, Misra S, Agrawal D, Rayankula A (2008) Using honey nodes along with channel surfing for defense against jamming attacks in wireless networks. In: Proceedings of the 3rd international conference on systems and networks communications (ICSNC 2008), Sliema, Malta, 26–31, pp 197–201

    Google Scholar 

  19. Singh R, Singh J, Singh R (2016) WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Hindawi Publishing Corporation. Mobile Information Systems, Volume, Article ID 8354930, pp 13

    Google Scholar 

  20. Chiu HS, Lui KS (2016) DEPHI: wormhole detection mechanism for ad hoc wireless networks. In: Proceedings of the IEEE 1st international symposium on wireless pervasive computing, pp 1–6

    Google Scholar 

  21. Ji S, Chen T, Zhong S (2015) Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans Mob Comput 14(3):660–674

    Google Scholar 

  22. Mukherjee S, Chattopadhyay M, Chattopadhyay S, Kar P (2016) Wormhole detection based on ordinal MDS using RTT in wireless sensor network. J Comput Netw Commun, Article ID 3405264:15

    Google Scholar 

  23. Hai TH, Huh E-N, Jo M (2009) A lightweight intrusion detection framework for wireless sensor networks. Wirel Commun Mob Comput 10:559–572

    Google Scholar 

  24. Anwar RW, Bakhtiari M, Zainal A, Abdullah AH, Qureshi KN (2015) Enhanced trust aware routing against wormhole attacks in wireless sensor networks. Int Conf Smart Sens Appl

    Google Scholar 

  25. Khalil I, Bagchi S, Shroff NB (2008) MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. J Ad Hoc Netw 6:344–362

    Google Scholar 

  26. Qazi S, Raad R, Mu Y, Susilo W (2013) Securing DSR against wormhole attacks in multirate ad hoc networks. J Netw Comput Appl 582–593

    Google Scholar 

  27. Patel M, Aggarwal A, Chaubey N (2016) Two phase wormhole attack detection in dynamic wireless sensor networks. In: IEEE international conference on wireless communications signal processing and networking, 23–25 March, Chennai, India

    Google Scholar 

  28. Patel M, Aggarwal A, Chaubey N (2018) Detecting wormhole attack in mobility based wireless sensor networks. Int J Commun Netw Distrib Syst 21(2)

    Google Scholar 

  29. Patel MM, Agarwal A, Chaubey N (2017) Wormhole attacks and countermeasures in wireless sensor networks: a survey. Int J Eng Technol 9(2):1049–1060

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Akshai Aggarwal or Nirbhay Chaubey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patel, M., Aggarwal, A., Chaubey, N. (2021). Experimental Analysis of Measuring Neighbourhood Change in the Presence of Wormhole in Mobile Wireless Sensor Networks. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-15-4474-3_37

Download citation

Publish with us

Policies and ethics