Open Access Open Access  Restricted Access Subscription or Fee Access

Robust Location Aware Wormhole Detection Technique for Wireless Sensor Network

Ajay Jangra, Bhavana .


The Wireless Sensor Networks are typically deployed in ubiquitous and pervasive applications that make them susceptible to various forms of security attacks. In addition, due to the limited battery capacity, processing and memory powered sensor nodes make it difficult to devise the security protocols that are inherently resource intensive. Due to lack of security, nodes tend to get compromised by the adversaries. These nodes attract the data towards itself and either modifies the data and denies forwarding it. This paper ensures that the sensor network is secure to large extend by eliminating the compromised nodes. One of the potent forms of attacks is the Wormhole attacks - a Denial of Service attack on the network layer. Wormhole attacks enable an attacker with limited resources and no cryptographic material to disrupt wireless networks. In wormhole attack, an attacker records packet at one location in the network, tunnels them (possibly selectively) to another location and retransmits them there into the network. In this paper, present an algorithm for detecting wormhole attacks in wireless sensor network.


GPS, Range Free Localization, Wormhole Attack, WSN.

Full Text:



C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", in Elsevier's Adhoc Network Journal Special Issue on Sensor Network Application and Protocols,2003.

Devesh Jinwala, "Ubiquitous Computing: Wireless Sensor Network Deployment, Models, Security, Tbreats and Challenges", in National conference NCIIRP-2006, SRMIST, pp. 1-8, April 2006.

X. Du and H. H. Chen, “Security in wireless sensor networks,” IEEE Wireless Communications, vol. 15, no. 4, pp. 60–66, Aug. 2008.

Hero Modares, Rosli Salleh, Amirhossein Moravejosharieh “Overview of Security Issues in Wireless Sensor Networks”, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation2011.

Rouba EI Kaissi, Ayman Kayssi, Ali Chehab and Zaher Dawy, "DA WWSEN: A Defense Mechanism against Wormhole Attacks In Wireless Sensor Networks", in the Second International Conference on Innovations in Information Technology, pp. 1-10, 2005.

Amar Rasheed, Rabi Mahapatra, “Mobile Sink Using Multiple Channels to Defend Against Wormhole Attacks in Wireless Sensor Networks”,IEEE 2009.

Prasannajit B, Venkatesh, Anupama S “An Approach towards Detection of Wormhole Attack in Sensor Networks”,2010.

Wassim Znaidi, Marine Minier and Jean-Philippe Babau, “Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information”, 2008.

R. Maheshwari, J. Gao. and S. R. Das, "Detecting wormhole attacks in wireless networks using connectivity information," in INFOCOM. IEEE, 2007.

L. Lazos, and R. Poovendran, “SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks,” Proceedings ACM WiSe, October 2004.

Khin Sandar Win, Pathein Gyi, “Analysis of Detecting Wormhole Attack in Wireless Networks,” Proceedings Of World Academy Of Science Engineering And Technology Volume 36 December 2008.

Sebastian Terence.J in paper “Secure Route Discovery against Wormhole Attacks in Sensor Networks using Mobile Agents”, 2011.

L. Hu and D. Evans. Using directional antennas to prevent wormhole attacks”, 5-6 February 2004.

P. Y. Hu and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In INFOCOM, April 2003.

He Ronghui, Ma Guoqing, Wang Chunlei, and Fang Lan "Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes”, 2009.

Qingji Qian, Xuanjing Shen, and Haipeng Chen, “An Improved Node Localization Algorithm Based on DV-Hop for Wireless Sensor Networks”, 2011.

LI Nian-qiang, LI Ping,”A Range-Free Localization Scheme in Wireless Sensor Networks”, IEEE 2008.

T. He, C. Huang, B.M. Blum, J. A. Stankovic, and T. Abdelzaher, “Range-free localization and its impact on large scale sensor networks, Nov. 2005.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.