A Wormhole Attack Defense Strategy of WSN Based on Node Location Information

Article Preview

Abstract:

Wormhole attack is a kind of attack manner in WSN that does not need to crack network encryption key, which has great harm. Aiming at the characteristics of Wormhole attack, a wormhole attack defense strategy based on node location information was presented. The manner computed physical distance between two nodes through extraction of location information in the packets and compared it with stored threshold, so as to determine whether these packets come from normal communication range. WSN network modeling and simulation results based on OMNeT++ indicates that AODV protocol of defense strategy added sensor node location information can implement successfully defense.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 268-270)

Pages:

1055-1060

Citation:

Online since:

July 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Khadija Stewart, Themistoklis Haniotakis and Spyros Tragoudas: A Security Protocol for Sensor Networks. Proc. of the IEEE Global Telecommunications Conference, vol. 3, 2005, pp.1827-1831.

DOI: 10.1109/glocom.2005.1577964

Google Scholar

[2] Taejoon Park and Kang G. Shin: Soft Tamper-proofing via Program Integrity Verification in Wireless Sensor Networks. IEEE Transactions on Mobile Computing, vol. 4, 2005, pp.297-309.

DOI: 10.1109/tmc.2005.44

Google Scholar

[3] Nirupama Bulusu, John Heidemann and Deborah Estrin: Gps-less Low Cost outdoor Localization for Very Small Devices. IEEE Personal Communications Magazine, vol. 7, 2000, pp.28-34.

DOI: 10.1109/98.878533

Google Scholar

[4] Al-Sakib Khan Pathan, Hyung-Woo Lee and Choong Seon Hong: Security in Wireless Sensor Networks: Issues and Challenges. Proc. of the 8th International Conference on Advanced Communication Technology, vol. 2, 2006, pp.1043-1048.

DOI: 10.1109/icact.2006.206151

Google Scholar