Skip to main content

2021 | OriginalPaper | Buchkapitel

A Technique to Detect Wormhole Attack in Wireless Sensor Network Using Artificial Neural Network

verfasst von : Moirangthem Marjit Singh, Nishigandha Dutta, Thounaojam Rupachandra Singh, Utpal Nandi

Erschienen in: Evolutionary Computing and Mobile Sustainable Networks

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wireless sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity information between any two sensor nodes as the detection feature. The proposed technique has been implemented considering the deployment of sensor nodes in the wireless sensor network area under uniform, Poisson, Gaussian, exponential, gamma & beta probability distributions. The proposed technique does not require any additional hardware resources and gives a comparatively high percentage of detection accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tomic I, McCann JA (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things J 4(6):1910–1923 Tomic I, McCann JA (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things J 4(6):1910–1923
2.
Zurück zum Zitat Yang G, Dai L, Wei Z (2018) Challenges, threats, security issues and new trends of underwater wireless sensor networks. Sensors 18(11):3907 Yang G, Dai L, Wei Z (2018) Challenges, threats, security issues and new trends of underwater wireless sensor networks. Sensors 18(11):3907
3.
Zurück zum Zitat Dutta N, Singh MM (2019) Wormhole attack in wireless sensor networks: a critical review. In: Advanced computing and communication technologies. Springer, pp 147–161 Dutta N, Singh MM (2019) Wormhole attack in wireless sensor networks: a critical review. In: Advanced computing and communication technologies. Springer, pp 147–161
4.
Zurück zum Zitat Singh MM, Dutta N (2017) Security issues in wireless sensor networks. Int J Distrib Cloud Comput 05(02):7–16 Singh MM, Dutta N (2017) Security issues in wireless sensor networks. Int J Distrib Cloud Comput 05(02):7–16
5.
Zurück zum Zitat Xie H, Yan Z, Yao Z, Atiquzzaman M (2018) Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet of Things J 6(2):2205–2224CrossRef Xie H, Yan Z, Yao Z, Atiquzzaman M (2018) Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet of Things J 6(2):2205–2224CrossRef
6.
Zurück zum Zitat Singh R, Singh J, Singh R (2016) WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob Inf Syst 2016:13pp. Hindawi Publishing Corperation. Article ID 8354930 Singh R, Singh J, Singh R (2016) WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob Inf Syst 2016:13pp. Hindawi Publishing Corperation. Article ID 8354930
7.
Zurück zum Zitat Maidamwar P, Chavhan N (2012) A survey on security issues to detect wormhole attack in wireless sensor network. Int J AdHoc Netw Syst (IJANS) 2(4):37–50 Maidamwar P, Chavhan N (2012) A survey on security issues to detect wormhole attack in wireless sensor network. Int J AdHoc Netw Syst (IJANS) 2(4):37–50
8.
Zurück zum Zitat Maheshwari R, Gao J, Das SR (2007) Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings of 26th IEEE international conference on computer communications, Barcelona, Spain, May 2007 Maheshwari R, Gao J, Das SR (2007) Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings of 26th IEEE international conference on computer communications, Barcelona, Spain, May 2007
9.
Zurück zum Zitat Pooja, Chauhan RK (2017) Review on security attacks and countermeasures in wireless sensor networks. Int J Adv Res Comput Sci 8(5):1275–1283 Pooja, Chauhan RK (2017) Review on security attacks and countermeasures in wireless sensor networks. Int J Adv Res Comput Sci 8(5):1275–1283
10.
Zurück zum Zitat Bendjima M, Feham M (2016) Wormhole attack detection in wireless sensor networks. In: Proceedings of SAI computing conference, London, UK, 13–15 July 2016 Bendjima M, Feham M (2016) Wormhole attack detection in wireless sensor networks. In: Proceedings of SAI computing conference, London, UK, 13–15 July 2016
11.
Zurück zum Zitat Sharma N, Singh U (2014) Various approaches to detect wormhole attack in wireless sensor network. Int J Comput Sci Mob Comput 3(2):29–33 Sharma N, Singh U (2014) Various approaches to detect wormhole attack in wireless sensor network. Int J Comput Sci Mob Comput 3(2):29–33
12.
Zurück zum Zitat Russell SJ, Norvig P (2003) Artificial intelligence - a modern approach, 2nd edn. Prentice Hall series in artificial intelligence Russell SJ, Norvig P (2003) Artificial intelligence - a modern approach, 2nd edn. Prentice Hall series in artificial intelligence
15.
Zurück zum Zitat Buntine WL, Weigend AS (1991) Bayesian back-propagation. Complex Syst 5(6):603–643MATH Buntine WL, Weigend AS (1991) Bayesian back-propagation. Complex Syst 5(6):603–643MATH
16.
Zurück zum Zitat Hecht-Nielsen R (1992) Theory of the backpropagation neural network. In: Neural networks for perception. Elsevier, pp 65–93 Hecht-Nielsen R (1992) Theory of the backpropagation neural network. In: Neural networks for perception. Elsevier, pp 65–93
17.
Zurück zum Zitat Hu YC, Perrig A, Johnson DB (2006) Wormhole attacks in wireless networks. IEEE J Sel Areas Commun 24:370–380CrossRef Hu YC, Perrig A, Johnson DB (2006) Wormhole attacks in wireless networks. IEEE J Sel Areas Commun 24:370–380CrossRef
18.
Zurück zum Zitat Shaon MNA, Ferens K (2015) Wireless sensor network wormhole detection using an artificial neural network. In: Proceedings of the international conference on wireless networks (ICWN), the steering committee of the world congress in computer science, computer engineering and applied computing (World-Comp), pp 115–120 Shaon MNA, Ferens K (2015) Wireless sensor network wormhole detection using an artificial neural network. In: Proceedings of the international conference on wireless networks (ICWN), the steering committee of the world congress in computer science, computer engineering and applied computing (World-Comp), pp 115–120
19.
Zurück zum Zitat Tun Z, Maw AH (2008) Wormhole attack detection in wireless sensor networks. World Acad Sci Eng Technol 46:545–550 Tun Z, Maw AH (2008) Wormhole attack detection in wireless sensor networks. World Acad Sci Eng Technol 46:545–550
20.
Zurück zum Zitat Wang W, Bhargava B (2004) Visualization of wormholes in sensor networks. In: Proceedings of 3rd ACM workshop on wireless security (WiSe’04), Philadelphia, USA, October 2004, pp 51–60 Wang W, Bhargava B (2004) Visualization of wormholes in sensor networks. In: Proceedings of 3rd ACM workshop on wireless security (WiSe’04), Philadelphia, USA, October 2004, pp 51–60
Metadaten
Titel
A Technique to Detect Wormhole Attack in Wireless Sensor Network Using Artificial Neural Network
verfasst von
Moirangthem Marjit Singh
Nishigandha Dutta
Thounaojam Rupachandra Singh
Utpal Nandi
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5258-8_29