Distributed detection of wormhole attacks in wireless sensor networks

Rennie de Graaf ; Islam Hegazy ; Jeffrey Horton ; Reihaneh Safavi-Naini 


Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distributed intrusion detection system that monitors the communication in the network and propose a criterion for the placement of intrusion detection nodes. The intrusion detection system searches for violations of that criterion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work. © 2010 ICST Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.

Other data

Issue Date 1-Dec-2010
Journal Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 
URI http://research.asu.edu.eg/123456789/574
DOI 10.1007/978-3-642-11723-7_14

Recommend this item

CORE Recommender

Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.