Abstract
In Wireless Sensor Network (WSN), securable data transmission is one of the most challenges. During the transmission between the source and a destination node, routing information of the particular path may be misbehaved by the particular nodes which are known as wormhole nodes/attackers. The paths which include the wormhole nodes are known as wormhole attacked paths. For improving security in WSN, these wormhole attacked paths should be identified. To achieve this, wormhole attack detection method and optimal or secure path selection are presented in this paper. Initially, ‘K’ paths or multiple paths are generated between source and destination using Ad-hoc On demand Multipath Distance Vector (AOMDV) routing protocol. Then, the source node identifies the wormhole attacked path by verifying the Detection Packet (DP) and Feedback Packet (FP) from the destination. After detecting the wormhole attacked paths, the source node selects the optimal path among the attacker free paths using Particle Swarm Optimization (PSO) algorithm. Simulation results show that the performance of the proposed approach improves energy efficiency and network lifetime of the network.
Similar content being viewed by others
References
Bhatia, A., & Hansdah, R. (2016). TRM-MAC: A TDMA-based reliable multicast MAC protocol for WSNs with flexibility to trade-off between latency and reliability. Computer Networks, 104, 79–93.
Thalore, R., Sharma, J., Khurana, M., & Jha, M. (2013). QoS evaluation of energy-efficient ML-MAC protocol for wireless sensor networks. AEU—International Journal of Electronics and Communications, 67(12), 1048–1053.
Mouradian, A., Auge-Blum, I., & Valois, F. (2014). RTXP: A localized real-time MAC-routing protocol for wireless sensor networks. Computer Networks, 67, 43–59.
Masdari, M., Bazarchi, S., & Bidaki, M. (2013). Analysis of secure LEACH-based clustering protocols in wireless sensor networks. Journal of Network and Computer Applications, 36(4), 1243–1260.
Alkhatib, A. A. A., & G. S. Baicher. (2012). Wireless sensor network architecture. In International conference on computer networks and communication systems (ICNCS 2012) (Vol. 35).
Udhayavani, M., & Chandrasekaran, M. (2018). Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: A trust-aware routing framework for wireless sensor networks. Cluster Computing, 22, 11919.
Ahmed, A., Abu Bakar, K., Channa, M., Haseeb, K., & Khan, A. (2015). A trust aware routing protocol for energy constrained wireless sensor network. Telecommunication Systems, 61(1), 123–140.
AlMansour, N., & Alahmadi, S. (2018). Secure ad hoc on-demand distance vector routing protocol in WSN. In 2018 1st international conference on computer applications & information security (ICCAIS) (pp. 1–4). IEEE.
Karthick, S., Sree Devi, E., & Nagarajan, R. V. (2017). Trust-distrust protocol for the secure routing in wireless sensor networks. In 2017 International conference on algorithms, methodology, models and applications in emerging technologies (ICAMMAET) (pp. 1–5). IEEE.
Ahmed, A., Bakar, K., Channa, M., & Khan, A. (2016). A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Networks and Applications, 21(2), 272–285.
Mehetre, D., Roslin, S., & Wagh, S. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Computing, 22, 1313.
AlFarraj, O., AlZubi, A., & Tolba, A. (2018) .Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing.
Deepa, C. & Latha, B. (2017). HHSRP: A cluster based hybrid hierarchical secure routing protocol for wireless sensor networks. Cluster Computing.
Zahedi, A., & Parma, F. (2018). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12, 167.
Mohajerani, A., & Gharavian, D. (2015). An ant colony optimization based routing algorithm for extending network lifetime in wireless sensor networks. Wireless Networks, 22(8), 2637–2647.
Prabha, V. R., & Latha, P. (2017). Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks. Sadhana, 42(2), 143–151.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Tamilarasi, N., Santhi, S.G. Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network. Wireless Pers Commun 114, 329–345 (2020). https://doi.org/10.1007/s11277-020-07365-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07365-4