WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor NetworksReportar como inadecuado

WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Mobile Information Systems - Volume 2016 2016, Article ID 8354930, 13 pages -

Research ArticleI.K.G. Punjab Technical University, Kapurthala, Punjab, India

Received 30 August 2016; Revised 23 October 2016; Accepted 2 November 2016

Academic Editor: Abdallah Makhoul

Copyright © 2016 Rupinder Singh et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time delay probability and packet loss probability of the established path in order to find the value of wormhole presence probability. The nodes in the path are given different ranking and subsequently colors according to their behavior. The most striking feature of WRHT consists of its capacity to defend against almost all categories of wormhole attacks without depending on any required additional hardware such as global positioning system, timing information or synchronized clocks, and traditional cryptographic schemes demanding high computational needs. The experimental results clearly indicate that the proposed technique has significant improvement over the existing wormhole attack detection techniques.

Autor: Rupinder Singh, Jatinder Singh, and Ravinder Singh

Fuente: https://www.hindawi.com/


Documentos relacionados