Wireless Sensor Network

Volume 5, Issue 3 (March 2013)

ISSN Print: 1945-3078   ISSN Online: 1945-3086

Google-based Impact Factor: 1  Citations  

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks

HTML  Download Download as PDF (Size: 837KB)  PP. 33-40  
DOI: 10.4236/wsn.2013.53005    5,123 Downloads   9,774 Views  Citations

ABSTRACT

Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a wormhole by directly linking two compromised nodes or using out-of-band channels. If these two kinds of attacks occur simultaneously in a network, existing methods cannot defend against them adequately. We thus propose a secure routing method for detecting false report injections and wormhole attacks in wireless sensor networks. The proposed method uses ACK messages for detecting wormholes and is based on a statistical en-route filtering (SEF) scheme for detecting false reports. Simulation results show that the proposed method reduces energy consumption by up to 20% and provide greater network security.

Share and Cite:

H. Choi, S. Nam and T. Cho, "A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks," Wireless Sensor Network, Vol. 5 No. 3, 2013, pp. 33-40. doi: 10.4236/wsn.2013.53005.

Cited by

[1] Battery-less IoT Devices: Energy Source Manipulation Attacks
2022
[2] False Data Detection in Wireless Sensor Networks
2020
[3] Distributed Wormhole Attack Mitigation Technique in WSNs
2019
[4] Distributed Wormhole Attack Mitigation Technique in WSNs.
2019
[5] RTT Centered Automatic and Dynamic Wormhole Attack Discovery in Sensor Network
2018
[6] Wormhole Attack Detection in Wireless Sensor Network
2018
[7] Location dependent key management schemes supported by random selected cell reporters in wireless sensor networks
2018
[8] En-Route Filtering Techniques in Wireless Sensor Networks: A Survey
Wireless Personal Communications, 2017
[9] Two phase wormhole detection approach for dynamic wireless sensor networks
2016
[10] Pruning Route Modifiers in Wireless Sensor Networks
Wireless Personal Communications, 2016
[11] Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks
Ad Hoc Networks, 2016
[12] Extending the network lifetime by pre-deterministic key distribution in CCEF in wireless sensor networks
Wireless Networks, 2015
[13] Extending the Network Lifetime by Pre-deterministic Key Distribution in CCEF in Wireless Sensor Networks1
2015
[14] AN ENHANCED DETECTION AND ENERGY-EFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELESS SENSOR NETWORKS
Informatics Engineering, an International Journal, 2015
[15] An ECC-Based Secure Routing Protocol for Wireless Sensor Network
Sensors & Transducers (1726-5479), 2014
[16] MULTI HOP CLUSTER DESIGN IN WIRELESS SENSOR NETWORKS
2013

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.