Open Access Open Access  Restricted Access Subscription or Fee Access

Distributed Wormhole Detection Algorithm for Wireless Sensor Network

(*) Corresponding author

Authors' affiliations



Wireless sensor Network (WSN) is currently emerging as an effective approach for numerous applications such as industrial and surveillance applications. However, several security issues inhibit the performance of the wireless sensor network. The wormhole attacks weaken the performance gain of the coding system. This paper proposes a wormhole geographic distributed detection (WGDD) algorithm using a hop technique to detect the wormhole attacks. The proposed WGDD algorithm utilizes a hop system as a test methodology, recreates nearby hubs utilizing multidimensional scaling at every hub, and uses a novel “diameter” gimmick to recognize the attack delivered by wormholes. The key preference of the calculation is that it detects wormhole attack and remove the attacker. In the proposed system, nodes can be created dynamically and are connected during the file transfer. The proposed algorithm is better than other wormhole detection algorithms, since it does not require anchoring nodes and any additional hardware.
Copyright © 2015 Praise Worthy Prize - All rights reserved.


Expected Transmission Count (ETX); Local Map; Wireless Sensor Network (WSN); Wormhole Attack; Wormhole Geographic Distributed Detection (WGDD)

Full Text:



S. Ji, T. Chen, S.Zhong, “Wormhole attack detection Algorithms in Wireless Network Coding Systems” 2014.

A. Jain, K. Kant, and M. Tripathy, “Security solutions for wireless sensor networks”, in Second International Conference on Advanced Computing & Communication Technologies(ACCT),2012, 2012, pp.430-433.

J. Bhatia and B. Shah, "Review On Various Security Threats & Solutions And Network Coding Based Security Approach For Vanet" International Journal of Advances in Engineering & Technology, vol. 6, 2013.

A. J. Newell, R. Curtmola, and C. Nita-Rotaru , "Entropy attacks and countermeasures in wireless network coding," in Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, 2012, pp. 185-196.

M. R. Ahmed, X. Huang, and H. Cui, "Mrakov chain Monte Carlo based internal attack evaluation for wireless sensor network," Int. J. Comput. Sci. Netw. Secur, vol. 13, pp. 23-31, 2013.

P. Lalwani, S. Silakari, and P. K. Shukla, "Optimized and Executive Survey on Mobile Ad-hoc Network," in International Symposium on Cloud and Services Computing (ISCOS), 2012, 2012, pp. 31-35.

G. Han, J. Jiang, L. Shu, M. Guizani, and S. Nishio, "A Two-Step Secure Localization for Wireless Sensor Networks," The Computer Journal, vol. 56, pp. 1154-1166, 2013.

B. K. Saluja and A. Gupta, "Detection and Prevention of Wormhole Attack in Spontaneous Wireless Network," 2014.

L. Li, G. Zhang, J. Nie, Y. Niu, and A. Yao, "The application of genetic algorithm to intrusion detection in MP2P network," in Advances in Swarm Intelligence, ed: Springer, 2012, pp. 390-397.

A. Modirkhazeni, N. Ithnin, and M. Abbasi, "Secure hierarchal routing protocols in wireless sensor networks; security survey analysis," International Journal of Computer Communications and Networks (IJCCN), vol. 2, 2012.

K. K. Joshi, N. Khemariya, and D. Chaudhary, "An Efficient Algorithm based on Fibonacci Pattern Hound Packets for Detection of Wormhole Attack in DSR for Mobile Ad Hoc Networks," International Journal of Computer Applications, vol. 63, 2013.

H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, "Detection and mitigation of sinkhole attacks in wireless sensor networks," Journal of Computer and System Sciences, Vol.80, pp. 644-653,2014.

C. Cheng, T. Jiang, and Q. Zhang, "TESLA-Based Homomorphic MAC for Authentication in P2P System for Live Streaming with Network Coding," IEEE Journal on Selected Areas in Communications,, vol. 31, pp. 291-298, 2013.

A. Modirkhazeni, S. Aghamahmoodi, and N. Niknejad, "Distributed approach to mitigate wormhole attack in wireless sensor networks," in The 7th International Conference on Networked Computing (INC), 2011 2011, pp. 122-128.

Q. Mi, J. A. Stankovic, and R. Stoleru, "Practical and secure localization and key distribution for wireless sensor networks," Ad Hoc Networks, vol. 10, pp. 946-961, 2012.

Irin Sherly.S, Dhanalakshmi.G, “Providing Immunity against Wormhole Attack in Wireless Network Coding System” , International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 2, February 2015.

David Neels Pon Kumar, D., Murugesan, K., Arun Kumar, K., Raj, J., Performance analysis of fuzzy neural based QoS scheduler for mobile WiMAX, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 377-385.

Krief, F., Bennani, Y., Gomes, D., Neuman de Souza, J., LECSOM: A low-energy routing algorithm based on SOM clustering for static and mobile wireless sensor networks, (2011) International Journal on Communications Antenna and Propagation (IRECAP), 1 (1), pp. 55-63.

Eroglu, A., Design of wireless data acquisition sensor system for health care applications, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 386-391.

Alla, S.B., Ezzati, A., A QoS-guaranteed coverage and connectivity preservation routing protocol for heterogeneous wireless sensor networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 363-371.

Mazinani, S.M., Yaghmaee, M.H., Tashtarian, F., Honary, M.T., Chitizadeh, J., On global clustering algorithm: Layer-oriented approach for first/last node dying applications inwireless sensor networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (5), pp. 328-339.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize