Defenses against wormhole attacks in wireless sensor networks

Rui Ma, Siyu Chen, Ke Ma*, Changzhen Hu, Xiajing Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Based on analyzing the characteristics of wormhole attacks in the wireless sensor networks, this paper proposes two kinds of defense strategies, which are based on monitoring neighbor node and node location information, in order to achieve effective defense against wormhole attacks using packet encapsulation. We simulate the running state of the static wireless sensor network under normal conditions and under the wormhole attack by using OMNeT++ simulation platform. And the network running process under wormhole attack is simulated in the case of applying the defense strategy based on monitoring neighbor node and the defense strategy based on node location information respectively. By analyzing the specific defense effect, the simulation results highlight the effectiveness of the proposed defense strategy.

Original languageEnglish
Title of host publicationNetwork and System Security - 11th International Conference, NSS 2017, Proceedings
EditorsZheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
PublisherSpringer Verlag
Pages413-426
Number of pages14
ISBN (Print)9783319647005
DOIs
Publication statusPublished - 2017
Event11th International Conference on Network and System Security, NSS 2017 - Helsinki, Finland
Duration: 21 Aug 201723 Aug 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10394 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Conference on Network and System Security, NSS 2017
Country/TerritoryFinland
CityHelsinki
Period21/08/1723/08/17

Keywords

  • Defense
  • Monitoring neighbor node
  • Node location information
  • Wireless sensor networks
  • Wormhole attack

Fingerprint

Dive into the research topics of 'Defenses against wormhole attacks in wireless sensor networks'. Together they form a unique fingerprint.

Cite this