WODEM: Wormhole attack defense mechanism in wireless sensor networks

Ji Hoon Yun, Il Hwan Kim, Jae Han Lim, Seung Woo Seo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Scopus citations

Abstract

The wormhole attack, which is accomplished by selectively relaying packets between two adversaries, can ruin routing and communication of the network without compromising any legitimate nodes. There have been a few countermeasures against the wormhole attack in generic ad hoc networks, but they are not appropriate for sensor networks since they require special devices (e.g. directional antenna) or put much overhead on each node. In this paper, we propose a new countermeasure against the wormhole attack for sensor networks, named WODEM. In WODEM, a few detector nodes equipped with location-aware devices and longer-lasting batteries detect wormholes, and normal sensor nodes are only required to forward control packets from the detector nodes. Therefore, WODEM is efficient in cost and energy. From the simulation results, we show that 10 detector nodes can detect a wormhole within the accuracy of 90% in a densely deployed sensor network.

Original languageEnglish
Title of host publicationUbiquitous Convergence Technology - First International Conference, ICUCT 2006, Revised Selected Papers
PublisherSpringer Verlag
Pages200-209
Number of pages10
ISBN (Print)9783540717881
DOIs
StatePublished - 2007
Event1st International Conference on Ubiquitous Convergence Technology, ICUCT 2006 - Jeju Island, Korea, Republic of
Duration: 5 Dec 20066 Dec 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4412 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Conference on Ubiquitous Convergence Technology, ICUCT 2006
Country/TerritoryKorea, Republic of
CityJeju Island
Period5/12/066/12/06

Keywords

  • Security
  • Sensor network
  • Wormhole attack

Fingerprint

Dive into the research topics of 'WODEM: Wormhole attack defense mechanism in wireless sensor networks'. Together they form a unique fingerprint.

Cite this