Jimma University Open access Institutional Repository

Wormhole Attacks Detection in Wireless Sensor Networks by Analyzing Transmission range and Residual Energy of Nodes

Show simple item record

dc.contributor.author Hussen, Kemal
dc.contributor.author Bayu, Fisseha
dc.contributor.author Kebede, Nahil
dc.date.accessioned 2023-01-30T12:02:32Z
dc.date.available 2023-01-30T12:02:32Z
dc.date.issued 2022-12-04
dc.identifier.uri https://repository.ju.edu.et//handle/123456789/7598
dc.description.abstract Wireless Sensor Networks have made significant progress and have emerged as an important study topic in wireless and distributed networks. Wireless sensor networks (WSN) are made up of a large number of tiny and inexpensive devices called sensor nodes. The sensor nodes are capable of detecting, actuating, and regulating the information gathered. There are several research challenges and issues with WSN such as security, power efficiency, scalability, responsiveness, and reliability. security becomes a key prerequisite for modern-age applications. Weak security or absence of security may not only conciliate classified information but also makes them accessible for malicious attacks. The network layer is vulnerable to different types of attacks like a Sinkhole, Wormhole, Sybil, Selective Forwarding, Hello Flood, Black Hole, greyhole, and so on. This paper deals with the detection and prevention of an attack on the network layer called a wormhole attack. A wormhole attack is one of the most popular and serious attacks in the wireless sensor network. It is a particularly damaging attack on routing protocols for specially designated systems in which two or more collaborating attackers record packets at one location and tunnel them to another for replay at that remote location. In This paper, we make a literature review of the detection and prevention of wormhole attacks. Also proposed transmission range-based and residual energy mechanisms for the detection of wormhole attacks. When the source node received RREP, it tracks the location of nodes on the route using GPS and records the actual distance between them and the minimum number of hops. Simulation results are used with the NS-2 simulator and our method has been evaluated in terms of detection rate, packet delivery ratio, throughput, and residual energy compare to a network without or with an attack. And results show that the detection rate of our method is 89.5% of the total adversary attacks conducted. en_US
dc.language.iso en_US en_US
dc.subject Security en_US
dc.subject Wormhole en_US
dc.subject Tunnel en_US
dc.subject transmission range en_US
dc.subject WSN en_US
dc.subject NS-2 en_US
dc.subject GPS en_US
dc.title Wormhole Attacks Detection in Wireless Sensor Networks by Analyzing Transmission range and Residual Energy of Nodes en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IR


Browse

My Account