A Wormhole Attack Detection and Prevention Technique in Wireless Sensor Networks

Article


Siddiqui, A., Karami, A. and Johnson, M. O. 2017. A Wormhole Attack Detection and Prevention Technique in Wireless Sensor Networks. International Journal of Computer Applications. 174 (Art. 4).
AuthorsSiddiqui, A., Karami, A. and Johnson, M. O.
Abstract

Security is one of the major and important issues surrounding network sensors because of its inherent liabilities, i.e. physical size. Since network sensors have no routers, all nodes involved in the network must share the same routing protocol to assist each other for the transmission of packets. Also, its unguided nature in dynamic topology makes it vulnerable to all kinds of security attack, thereby posing a degree of security challenges. Wormhole is a prominent example of attacks that poses the greatest threat because of its difficulty in detecting and preventing. In this paper, we proposed a wormhole attach detection and prevention mechanism incorporated AODV routing protocol, using neighbour discovery and path verification mechanism. As compared to some preexisting methods, the proposed approach is effective and promising based on applied performance metrics.

JournalInternational Journal of Computer Applications
Journal citation174 (Art. 4)
ISSN0975-8887
Year2017
PublisherFoundation of Computer Science
Accepted author manuscript
License
Digital Object Identifier (DOI)doi:10.5120/ijca2017915376
Web address (URL)https://doi.org/10.5120/ijca2017915376
Publication dates
Online05 Sep 2017
Publication process dates
Accepted15 Aug 2017
Deposited04 Jul 2019
Copyright holder© 2017 International Journal of Computer Applications
Copyright informationThis is an accepted manuscript of an article published in International Journal of Computer Applications, Volume 174 - No. 4, 2017. https://doi.org/10.5120/ijca2017915376.
Permalink -

https://repository.uel.ac.uk/item/86v26

  • 13
    total views
  • 21
    total downloads
  • 5
    views this month
  • 3
    downloads this month

Related outputs

Improving Student Engagement and Performance in Computing Final Year Projects
Siddiqui, A. 2019. Improving Student Engagement and Performance in Computing Final Year Projects. IEEE TALE 2019. Yogyakarta - Indonesia 10 - 13 Oct 2019 IEEE.
An Effective Framework for Enhancing Student Engagement and Performance in Final Year Projects
Siddiqui, A., Naeem, U. and Islam, S. 2019. An Effective Framework for Enhancing Student Engagement and Performance in Final Year Projects. in: Ashmawy, A. K. and Schreiter, S. (ed.) 2019 IEEE Global Engineering Education Conference (EDUCON) IEEE. pp. 401-410
An Anomaly-based Intrusion Detection System in Presence of Benign Outliers with Visualization Capabilities
Karami, A. 2018. An Anomaly-based Intrusion Detection System in Presence of Benign Outliers with Visualization Capabilities. Expert Systems with Applications. 108, pp. 36-60.
Functional Connectivity Evaluation for Infant EEG Signals based on Artificial Neural Network
Sharif, M., Naeem, U., Islam, S. and Karami, A. 2018. Functional Connectivity Evaluation for Infant EEG Signals based on Artificial Neural Network. in: Arai, Kohei, Kapoor, Supriya and Bhatia, Rahul (ed.) Intelligent Systems and Applications: Proceedings of the 2018 Intelligent Systems Conference (IntelliSys) Volume 2 Springer, Cham.
The Application of a Semantic-Based Process Mining Framework on a Learning Process Domain
Okoye, Kingsley, Islam, S., Naeem, U., Sharif, M., Azam, Muhammad Awais and Karami, A. 2018. The Application of a Semantic-Based Process Mining Framework on a Learning Process Domain. in: Arai, Kohei, Kapoor, Supriya and Bhatia, Rahul (ed.) Intelligent Systems and Applications: Proceedings of the 2018 Intelligent Systems Conference (IntelliSys) Volume 1 Springer, Cham.
A Framework for Uncertainty-Aware Visual Analytics in Big Data
Karami, A. 2015. A Framework for Uncertainty-Aware Visual Analytics in Big Data. CEUR Workshop Proceedings. 1510, pp. 146-155.
Utilization of multi attribute decision making techniques to integrate automatic and manual ranking of options
Karami, A. and Johansson, Ronnie 2013. Utilization of multi attribute decision making techniques to integrate automatic and manual ranking of options. Journal of Information Science and Engineering. 30 (2), pp. 519-534.
Choosing DBSCAN parameters automatically using differential evolution
Karami, A. and Johansson, Ronnie 2014. Choosing DBSCAN parameters automatically using differential evolution. International Journal of Computer Applications. 91 (7), pp. 1-11.
A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks
Karami, A. and Guerrero-Zapata, Manel 2014. A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks. Neurocomputing. 149 (Part C), pp. 1253-1269.
A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in Named Data Networking
Karami, A. and Guerrero-Zapata, Manel 2014. A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in Named Data Networking. Neurocomputing. 151 (3), pp. 1262-1282.
An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking
Karami, A. and Guerrero-Zapata, Manel 2015. An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking. Computer Networks. 80 (April), pp. 51-65.
ACCPndn: Adaptive Congestion Control Protocol in Named Data Networking by learning capacities using optimized Time-Lagged Feedforward Neural Network
Karami, A. 2015. ACCPndn: Adaptive Congestion Control Protocol in Named Data Networking by learning capacities using optimized Time-Lagged Feedforward Neural Network. Journal of Network and Computer Applications. 56 (Oct.), pp. 1-18.