Intrusion Detection System in Wireless Sensor Networks for Wormhole Attack Using Trust-Based System

Intrusion Detection System in Wireless Sensor Networks for Wormhole Attack Using Trust-Based System

Umashankar Ghugar (Berhampur University, India) and Jayaram Pradhan (Berhampur University, India)
DOI: 10.4018/978-1-5225-5152-2.ch010
OnDemand PDF Download:
No Current Special Offers


Intrusion detection in wireless sensor network (WSN) has been a critical issue for the stable functioning of the networks during last decade. Wireless sensors are small and cheap devices that have a capacity to sense actions, data movement, and communicate with each other. It is a self-governing network that consists of sensor nodes deployed in a particular environment, which has wide applications in various areas such as data gathering, military surveillance, transportation, medical system, agriculture, smart building, satellite communication, and healthcare. Wormhole attack is one of the serious attacks, which is smoothly resolved in networks but difficult to observe. There are various techniques used to detect the malicious node such as LITEWORP, SAM, DelPHI, GRPW, and WRHT. This chapter focuses on detection methods for wormhole attacks using trust-based systems in WSN.
Chapter Preview

1. Introduction

WSN is a distributive, automatic governing network, which is deployed in a specific environment. Sensor nodes observe the different condition, such as compression, heat, humidity, wave direction at different areas (Tiwari, Veer, Arya, Choudhari, Sidharth, & Choudhary, 2009). A sensor node is a cheap device and has a low measurement resource. They are honestly arranged in a sensed environment (Boukerch, & Xu, 2007;Das, Nalik, Pati, & Panigrahi, 2014). WSN are broadly used in various applications such as target tracking, traffic monitoring, area observing, forest fire observing, home affirmation, health management devices and satellite communication. In WSN number of security issues are maintained for smooth communication and also some limitation such as less computation power, limited lifetime, less storage and low bandwidth (Du & Li, 2011; Bao, Chen, Chang, & Cho, 2012). Based on these limitations they are arranged in noisy climate. It is highly affected and sensitive to different types of attacks (Rassam, Maarof, & Zainal, 2012; Panigrahi Sarkar, Pati, & Das, 2016).

There are different types of attack namely Wormhole Attack, Hello flood Attack, Sinkhole Attack, Blackhole Attack, Sybil Attack, and Denial of Service are found. Our proposed approach considers only the Wormhole attack.

1.1. Wormhole Attack

Wormhole attack is the most destructive attacks in WSN. Generally two or more abnormal nodes create a tunnel. Here the attackers are directly connected through shortest route to each other, so that they can broadcast at a high speed over the networks with other nodes. A wormhole attack can be freely carried out against routing in the sensor networks. Thus most of routing protocols do not have any mechanism to prevent from it (Sabri & Kamoun, 2016). In other words, when the wormhole attack occurs, it drops all the packets and cause network interruption. It also acts as investigator on the packets and breaks the network security. Wormhole attack is also used in the form of merging of selective forward and Sybil attack (Singh, 2012; Yamin & Sen, 2017).

Figure 1.

Wormhole Attack in WSN


Figure 1, shows how data packets are transmitted between the two Nodes A and E, where D is a malicious node.

Complete Chapter List

Search this Book: