Skip to main content
Top

2021 | OriginalPaper | Chapter

A Technique to Detect Wormhole Attack in Wireless Sensor Network Using Artificial Neural Network

Authors : Moirangthem Marjit Singh, Nishigandha Dutta, Thounaojam Rupachandra Singh, Utpal Nandi

Published in: Evolutionary Computing and Mobile Sustainable Networks

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wireless sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity information between any two sensor nodes as the detection feature. The proposed technique has been implemented considering the deployment of sensor nodes in the wireless sensor network area under uniform, Poisson, Gaussian, exponential, gamma & beta probability distributions. The proposed technique does not require any additional hardware resources and gives a comparatively high percentage of detection accuracy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Tomic I, McCann JA (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things J 4(6):1910–1923 Tomic I, McCann JA (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things J 4(6):1910–1923
2.
go back to reference Yang G, Dai L, Wei Z (2018) Challenges, threats, security issues and new trends of underwater wireless sensor networks. Sensors 18(11):3907 Yang G, Dai L, Wei Z (2018) Challenges, threats, security issues and new trends of underwater wireless sensor networks. Sensors 18(11):3907
3.
go back to reference Dutta N, Singh MM (2019) Wormhole attack in wireless sensor networks: a critical review. In: Advanced computing and communication technologies. Springer, pp 147–161 Dutta N, Singh MM (2019) Wormhole attack in wireless sensor networks: a critical review. In: Advanced computing and communication technologies. Springer, pp 147–161
4.
go back to reference Singh MM, Dutta N (2017) Security issues in wireless sensor networks. Int J Distrib Cloud Comput 05(02):7–16 Singh MM, Dutta N (2017) Security issues in wireless sensor networks. Int J Distrib Cloud Comput 05(02):7–16
5.
go back to reference Xie H, Yan Z, Yao Z, Atiquzzaman M (2018) Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet of Things J 6(2):2205–2224CrossRef Xie H, Yan Z, Yao Z, Atiquzzaman M (2018) Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet of Things J 6(2):2205–2224CrossRef
6.
go back to reference Singh R, Singh J, Singh R (2016) WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob Inf Syst 2016:13pp. Hindawi Publishing Corperation. Article ID 8354930 Singh R, Singh J, Singh R (2016) WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob Inf Syst 2016:13pp. Hindawi Publishing Corperation. Article ID 8354930
7.
go back to reference Maidamwar P, Chavhan N (2012) A survey on security issues to detect wormhole attack in wireless sensor network. Int J AdHoc Netw Syst (IJANS) 2(4):37–50 Maidamwar P, Chavhan N (2012) A survey on security issues to detect wormhole attack in wireless sensor network. Int J AdHoc Netw Syst (IJANS) 2(4):37–50
8.
go back to reference Maheshwari R, Gao J, Das SR (2007) Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings of 26th IEEE international conference on computer communications, Barcelona, Spain, May 2007 Maheshwari R, Gao J, Das SR (2007) Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings of 26th IEEE international conference on computer communications, Barcelona, Spain, May 2007
9.
go back to reference Pooja, Chauhan RK (2017) Review on security attacks and countermeasures in wireless sensor networks. Int J Adv Res Comput Sci 8(5):1275–1283 Pooja, Chauhan RK (2017) Review on security attacks and countermeasures in wireless sensor networks. Int J Adv Res Comput Sci 8(5):1275–1283
10.
go back to reference Bendjima M, Feham M (2016) Wormhole attack detection in wireless sensor networks. In: Proceedings of SAI computing conference, London, UK, 13–15 July 2016 Bendjima M, Feham M (2016) Wormhole attack detection in wireless sensor networks. In: Proceedings of SAI computing conference, London, UK, 13–15 July 2016
11.
go back to reference Sharma N, Singh U (2014) Various approaches to detect wormhole attack in wireless sensor network. Int J Comput Sci Mob Comput 3(2):29–33 Sharma N, Singh U (2014) Various approaches to detect wormhole attack in wireless sensor network. Int J Comput Sci Mob Comput 3(2):29–33
12.
go back to reference Russell SJ, Norvig P (2003) Artificial intelligence - a modern approach, 2nd edn. Prentice Hall series in artificial intelligence Russell SJ, Norvig P (2003) Artificial intelligence - a modern approach, 2nd edn. Prentice Hall series in artificial intelligence
15.
go back to reference Buntine WL, Weigend AS (1991) Bayesian back-propagation. Complex Syst 5(6):603–643MATH Buntine WL, Weigend AS (1991) Bayesian back-propagation. Complex Syst 5(6):603–643MATH
16.
go back to reference Hecht-Nielsen R (1992) Theory of the backpropagation neural network. In: Neural networks for perception. Elsevier, pp 65–93 Hecht-Nielsen R (1992) Theory of the backpropagation neural network. In: Neural networks for perception. Elsevier, pp 65–93
17.
go back to reference Hu YC, Perrig A, Johnson DB (2006) Wormhole attacks in wireless networks. IEEE J Sel Areas Commun 24:370–380CrossRef Hu YC, Perrig A, Johnson DB (2006) Wormhole attacks in wireless networks. IEEE J Sel Areas Commun 24:370–380CrossRef
18.
go back to reference Shaon MNA, Ferens K (2015) Wireless sensor network wormhole detection using an artificial neural network. In: Proceedings of the international conference on wireless networks (ICWN), the steering committee of the world congress in computer science, computer engineering and applied computing (World-Comp), pp 115–120 Shaon MNA, Ferens K (2015) Wireless sensor network wormhole detection using an artificial neural network. In: Proceedings of the international conference on wireless networks (ICWN), the steering committee of the world congress in computer science, computer engineering and applied computing (World-Comp), pp 115–120
19.
go back to reference Tun Z, Maw AH (2008) Wormhole attack detection in wireless sensor networks. World Acad Sci Eng Technol 46:545–550 Tun Z, Maw AH (2008) Wormhole attack detection in wireless sensor networks. World Acad Sci Eng Technol 46:545–550
20.
go back to reference Wang W, Bhargava B (2004) Visualization of wormholes in sensor networks. In: Proceedings of 3rd ACM workshop on wireless security (WiSe’04), Philadelphia, USA, October 2004, pp 51–60 Wang W, Bhargava B (2004) Visualization of wormholes in sensor networks. In: Proceedings of 3rd ACM workshop on wireless security (WiSe’04), Philadelphia, USA, October 2004, pp 51–60
Metadata
Title
A Technique to Detect Wormhole Attack in Wireless Sensor Network Using Artificial Neural Network
Authors
Moirangthem Marjit Singh
Nishigandha Dutta
Thounaojam Rupachandra Singh
Utpal Nandi
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5258-8_29