Skip to main content

Advertisement

Log in

Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In Wireless Sensor Network (WSN), securable data transmission is one of the most challenges. During the transmission between the source and a destination node, routing information of the particular path may be misbehaved by the particular nodes which are known as wormhole nodes/attackers. The paths which include the wormhole nodes are known as wormhole attacked paths. For improving security in WSN, these wormhole attacked paths should be identified. To achieve this, wormhole attack detection method and optimal or secure path selection are presented in this paper. Initially, ‘K’ paths or multiple paths are generated between source and destination using Ad-hoc On demand Multipath Distance Vector (AOMDV) routing protocol. Then, the source node identifies the wormhole attacked path by verifying the Detection Packet (DP) and Feedback Packet (FP) from the destination. After detecting the wormhole attacked paths, the source node selects the optimal path among the attacker free paths using Particle Swarm Optimization (PSO) algorithm. Simulation results show that the performance of the proposed approach improves energy efficiency and network lifetime of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Bhatia, A., & Hansdah, R. (2016). TRM-MAC: A TDMA-based reliable multicast MAC protocol for WSNs with flexibility to trade-off between latency and reliability. Computer Networks, 104, 79–93.

    Article  Google Scholar 

  2. Thalore, R., Sharma, J., Khurana, M., & Jha, M. (2013). QoS evaluation of energy-efficient ML-MAC protocol for wireless sensor networks. AEU—International Journal of Electronics and Communications, 67(12), 1048–1053.

    Article  Google Scholar 

  3. Mouradian, A., Auge-Blum, I., & Valois, F. (2014). RTXP: A localized real-time MAC-routing protocol for wireless sensor networks. Computer Networks, 67, 43–59.

    Article  Google Scholar 

  4. Masdari, M., Bazarchi, S., & Bidaki, M. (2013). Analysis of secure LEACH-based clustering protocols in wireless sensor networks. Journal of Network and Computer Applications, 36(4), 1243–1260.

    Article  Google Scholar 

  5. Alkhatib, A. A. A., & G. S. Baicher. (2012). Wireless sensor network architecture. In International conference on computer networks and communication systems (ICNCS 2012) (Vol. 35).

  6. Udhayavani, M., & Chandrasekaran, M. (2018). Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: A trust-aware routing framework for wireless sensor networks. Cluster Computing, 22, 11919.

    Article  Google Scholar 

  7. Ahmed, A., Abu Bakar, K., Channa, M., Haseeb, K., & Khan, A. (2015). A trust aware routing protocol for energy constrained wireless sensor network. Telecommunication Systems, 61(1), 123–140.

    Article  Google Scholar 

  8. AlMansour, N., & Alahmadi, S. (2018). Secure ad hoc on-demand distance vector routing protocol in WSN. In 2018 1st international conference on computer applications & information security (ICCAIS) (pp. 1–4). IEEE.

  9. Karthick, S., Sree Devi, E., & Nagarajan, R. V. (2017). Trust-distrust protocol for the secure routing in wireless sensor networks. In 2017 International conference on algorithms, methodology, models and applications in emerging technologies (ICAMMAET) (pp. 1–5). IEEE.

  10. Ahmed, A., Bakar, K., Channa, M., & Khan, A. (2016). A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Networks and Applications, 21(2), 272–285.

    Article  Google Scholar 

  11. Mehetre, D., Roslin, S., & Wagh, S. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Computing, 22, 1313.

    Article  Google Scholar 

  12. AlFarraj, O., AlZubi, A., & Tolba, A. (2018) .Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing.

  13. Deepa, C. & Latha, B. (2017). HHSRP: A cluster based hybrid hierarchical secure routing protocol for wireless sensor networks. Cluster Computing.

  14. Zahedi, A., & Parma, F. (2018). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12, 167.

    Article  Google Scholar 

  15. Mohajerani, A., & Gharavian, D. (2015). An ant colony optimization based routing algorithm for extending network lifetime in wireless sensor networks. Wireless Networks, 22(8), 2637–2647.

    Article  Google Scholar 

  16. Prabha, V. R., & Latha, P. (2017). Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks. Sadhana, 42(2), 143–151.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Tamilarasi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tamilarasi, N., Santhi, S.G. Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network. Wireless Pers Commun 114, 329–345 (2020). https://doi.org/10.1007/s11277-020-07365-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07365-4

Keywords

Navigation