scispace - formally typeset
Proceedings ArticleDOI

Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis

TLDR
This paper presents the SA-TC algorithm, based on the on-demand multi-path routings and uses statistical analysis and time constraint to identify the suspected links and shows that it can detect and locate wormhole attacks successfully and efficiently.
Abstract
With the properties of openness and dynamic in topology, wireless sensor networks are challenged with great security threats. In this paper we focus on the wormhole attack which is proved to be particularly dangerous to the resource-limited sensor nodes. We present the SA-TC algorithm for detecting and thus defending against this serious threat. It is based on the on-demand multi-path routings and uses statistical analysis and time constraint to identify the suspected links. It needs neither time synchronization among the sensors nor extra hardwares such as directional antenna and GPS. The simulative experiment shows that SA-TC can detect and locate wormhole attacks successfully and efficiently.

read more

Citations
More filters
Journal ArticleDOI

Data Collection for Security Measurement in Wireless Sensor Networks: A Survey

TL;DR: An overview of WSNs is provided and classify the attacks in W SNs based on protocol stack layers and attack detection methods of eleven mainstream attacks are researched for WSN security measurement.
Proceedings ArticleDOI

Security attacks in wireless sensor networks: A survey

TL;DR: This paper discussed about all the attacks on wireless sensor networks, some of the mitigation schemes to defend these attacks, and how to defend against these attacks.
Proceedings ArticleDOI

Wormhole attacks in wireless adhoc networks and their counter measurements: A survey

TL;DR: The modes of wormholes, how wormholes disrupts routing in AODV, DSR, OLSR and then the solutions and countermeasures on wormholes are discussed.
Dissertation

Energy-efficient routing and secure communication in wireless sensor networks

TL;DR: In this paper, the authors present a list of publications with the same title.xviii List of Publications xx list of authors xx list list of titles xx.xvi List of publications
Proceedings ArticleDOI

Digital Investigation of Wormhole Attacks in Wireless Sensor Networks

TL;DR: A set of algorithms are proposed to aggregate the collected evidences, identify colluding nodes, and reconstruct the potential scenarios of wormholes attacks in WSN.
References
More filters

Dynamic Source Routing in Ad Hoc Wireless Networks.

TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

Dynamic Source Routing in Ad Hoc Wireless Networks

TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Proceedings ArticleDOI

Packet leashes: a defense against wormhole attacks in wireless networks

TL;DR: A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
Proceedings ArticleDOI

Split multipath routing with maximally disjoint paths in ad hoc networks

TL;DR: This work proposes an on-demand routing scheme called split multipath routing (SMR) that establishes and utilizes multiple routes of maximally disjoint paths and uses a per-packet allocation scheme to distribute data packets into multiple paths of active sessions.
Proceedings Article

Using Directional Antennas to Prevent Wormhole Attacks.

TL;DR: A cooperative protocol whereby nodes share directional information to prevent wormhole endpoints from masquerading as false neighbors is presented, which greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.
Related Papers (5)