SlideShare a Scribd company logo
WIRELESS SENSOR NETWORKS
Introduction
• In this paper, we focus on defending against
  the wormhole attack in the DV-Hop
  localization process, i.e., overcoming the
  impacts of the wormhole attack on the DV-
  Hop localization.
• We propose a label-based secure localization
  scheme which is wormhole attack resistant
  based on the DV-Hop localization process.
OBJECTIVE OF LABEL BASED SECURE LOCALIZATION


• We analyze the impact of the wormhole
  attack on the DV-Hop localization process.

• We propose a wormhole attack resistant
  approach that can remove the packets
  delivered through the wormhole link to
  achieve secure localization.
Literature Review
Existing System
• Wormhole attack detection algorithm using a
  hop counting technique as a probe procedure,
  reconstructing a local map for each node and
  using a “diameter” feature to detect
  abnormalities caused by wormholes.

                                   continued…
Literature Review
• The wormhole attack detection scheme
  adopts the maximum number of independent
  neighbors of two non-neighbor nodes.

• Existing Wormhole attacks can negatively
  affect the localization in wireless sensor
  networks.
Proposed System
• We describe our proposed wormhole attack
  resistant localization scheme, called label-
  based DV Hop localization.

• The label-based DV-Hop localization scheme
  includes three phases, beacon nodes labeling,
  sensor nodes labeling, and DV-Hop-based
  secure localization.
Proposed System(continued)
• The beacon nodes are differentiated and
  labeled according to their geographic
  relationship under a wormhole attack.

• After eliminating the illegal connections
  among the labeled neighboring nodes which
  are contaminated by the wormhole attack,
  the DV Hop localization procedure can be
  successfully conducted.
System Requirments
HARDWARE REQUIREMENTS:

Processor       : Pentium IV 2.8GHz.
RAM             : 512 MB RAM.
Hard Disk : 40 GB.
Input device    : Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
System Requirments
SOFTWARE REQUIREMENTS:

Operating System   :   Windows XP
Language           :   JDK 1.5.
SYSTEM DESIGN
DATAFLOW DIAGRAM
USE CASE DIAGRAM
STATE DIAGRAM
SEQUENCE DIAGRAM
DV-HOP LOCALIZATION
The main idea of our scheme is to generate a pseudo
neighbor list for each beacon node, use all pseudo
neighbor lists received from neighboring beacon
nodes to classify all attacked nodes into different
groups, and then label all neighboring nodes
(including beacons and sensors). According to the
labels of neighboring nodes, each node prohibits the
communications with its pseudo neighbors, which
are attacked by the wormhole attack.
WORMHOLE ATTACK
We address the Security issue of the
wormhole attack upon the range-free DV-Hop
based localization process. We analyze the
impacts of wormhole attack on DV-Hop
localization scheme. Based on the basic DV-
Hop localization process, we propose a label-
based secure localization scheme to defend
against the wormhole attack.
BASIC DV-HOP LOCALIZATION
“Basic DV-Hop Localization without Wormhole
Attack” indicates the relative localization error for
the DV-Hop localization scheme when there is no
wormhole attack. We can see that the curve is quite
stable when the ratio of beacons to sensors varies,
which suggests that the accuracy of the DV-hop
localization is insensitive to the number of beacons
in the network. Therefore, this curve is used as the
reference when the wormhole attack exists.
LABEL-BASED DV-HOP LOCALIZATION

We propose a label-based secure localization
scheme to defend against the wormhole
attack. Simulation results demonstrate that
our proposed secure localization scheme is
capable of detecting the wormhole attack and
resisting its adverse impacts with a high
probability.
Conclusion
We analyze the severe impacts of the
wormhole attack on the DV-Hop based
localization in wirelesssensor networks. To
tackle this secure problem, wepropose a label-
based secure localization scheme to detect
and resist the wormhole attack for the DV-
Hop localization process. We also conduct
simulations to demonstrate the effectiveness
of our proposed scheme under different
network parameters.
FUTURE ENHANCEMENT
The proposed scheme works well in the
scenario when the network has no packet
loss, and the transmission ranges of all nodes
are identical. In our future work, we will
extend our secure localization scheme to
tolerate the packet loss. Also, we will consider
the scenario when different types of nodes
have different transmission ranges.
REFERENCES
• H. Chen, W. Lou, and Z. Wang, “A Consistency-based Secure
  Localization Scheme AgainstWormhole Attacks in WSNs,”in
  Proc. of the International Conference on Wireless Algorithms,
  Systems and Applications (WASA), 2009.
• H. Chen, W. Lou, X. Sun, and Z. Wang, “A Secure Localization
  Approach Against Wormhole Attacks Using Distance
  Consistency,” Eurasip Journal on Wireless Communications
  and Networking, Spacial Issue on Wireless Network
  Algorithms, Systems, and Applications, 2009.
REFERENCES(continued)
W. Wang and A. Lu, “Interactive wormhole detection and
evaluation,”Information Visualization, vol. 6, no. 1, pp. 3–17,
2007.
 ——, “HiRLoc: High-Resolution Robust Localization for
Wireless Sensor Networks,” IEEE Journal on Selected Areas in
Communications, vol. 24, no. 2, pp. 233–246, 2006.
 S. Capkun, M. Cagalj, and M. Srivastava, “Secure Localization
With Hidden and Mobile Base Stations,” in Proc. of IEEE
INFOCOM, 2006.

More Related Content

PPTX
Wormhole attack
PDF
Wormhole Attack
PPTX
A survey on complex wormhole attack in wireless
PPTX
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
PDF
Detection and prevention of wormhole attack in mobile adhoc networks
PPTX
Preventing jamming attack by combining cryptography
PDF
3 packet-hiding methods for preventing selective
Wormhole attack
Wormhole Attack
A survey on complex wormhole attack in wireless
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
Detection and prevention of wormhole attack in mobile adhoc networks
Preventing jamming attack by combining cryptography
3 packet-hiding methods for preventing selective

What's hot (20)

PPTX
NetSim Webinar on Network Attacks and Detection
PDF
wormhole attacks in wireless networks
PPT
Security in mobile ad hoc networks
PDF
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
PPTX
Black hole attack
PDF
Wormhole attack detection algorithms in wireless network coding systems
PDF
D0961927
PDF
Selective jamming attack prevention based on packet hiding methods and wormholes
PPTX
Blackhole Attck detection in AODV Protocol
PDF
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
PPTX
Ad hoc secuirty-vemula
PDF
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
PPTX
6. security in wireless sensor netwoks
PDF
Jamming attacks in wireless networks
PDF
A43030104
PDF
AODV protocol and Black Hole attack
PDF
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PDF
Attacks on mobile ad hoc networks
NetSim Webinar on Network Attacks and Detection
wormhole attacks in wireless networks
Security in mobile ad hoc networks
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Black hole attack
Wormhole attack detection algorithms in wireless network coding systems
D0961927
Selective jamming attack prevention based on packet hiding methods and wormholes
Blackhole Attck detection in AODV Protocol
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Ad hoc secuirty-vemula
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
6. security in wireless sensor netwoks
Jamming attacks in wireless networks
A43030104
AODV protocol and Black Hole attack
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
Attacks on mobile ad hoc networks
Ad

Viewers also liked (15)

PDF
Label based dv-hop localization against wormhole attacks in wireless sensor n...
PPTX
localization in wsn
DOCX
Discovery and verification Documentation
DOCX
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
PDF
Ieee 2015 2016
DOC
Basic Architecture of Wireless Sensor Network
PPT
Introduction to Computer Networks
PPT
Localization in WSN
DOCX
Wireless sensor network report
PDF
Performance Analysis of DV-Hop Localization Using Voronoi Approach
PDF
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
PDF
UNDERWATER SENSORS NETWORKS
PPTX
Underwater sensor network
Label based dv-hop localization against wormhole attacks in wireless sensor n...
localization in wsn
Discovery and verification Documentation
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
Ieee 2015 2016
Basic Architecture of Wireless Sensor Network
Introduction to Computer Networks
Localization in WSN
Wireless sensor network report
Performance Analysis of DV-Hop Localization Using Voronoi Approach
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
UNDERWATER SENSORS NETWORKS
Underwater sensor network
Ad

Similar to Wireless sensor networks (20)

DOCX
A detection & prevention of wormhole attack in wsn project abstract
DOCX
Detection and localization of multiple spoofing attackers in wireless networks
DOCX
Discovery and verification of neighbor positions in mobile ad hoc networks
PDF
Security in Manet Using Fl-Saodv
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
DOCX
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
PPTX
Behavioral malware detection in delay tolerant network
DOCX
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
PDF
Protocols for detection of node replication attack on wireless sensor network
PDF
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
PDF
Parallel and Distributed System IEEE 2014 Projects
PDF
Parallel and-distributed-system-ieee-2014-projects
PDF
I1802046780
PDF
B43040610
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
PDF
International Journal of Engineering Research and Development
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
PDF
Iaetsd secure data dissemination based on
PPTX
Security in wireless sensor network
PDF
O010528791
A detection & prevention of wormhole attack in wsn project abstract
Detection and localization of multiple spoofing attackers in wireless networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Security in Manet Using Fl-Saodv
Vampire attacks draining life from wireless ad hoc sensor networks
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
Behavioral malware detection in delay tolerant network
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
Protocols for detection of node replication attack on wireless sensor network
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Parallel and Distributed System IEEE 2014 Projects
Parallel and-distributed-system-ieee-2014-projects
I1802046780
B43040610
Vampire attacks draining life from wireless ad hoc sensor networks
International Journal of Engineering Research and Development
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
Iaetsd secure data dissemination based on
Security in wireless sensor network
O010528791

Recently uploaded (20)

PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Insiders guide to clinical Medicine.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Cell Structure & Organelles in detailed.
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
master seminar digital applications in india
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Cell Types and Its function , kingdom of life
PPTX
Pharma ospi slides which help in ospi learning
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
102 student loan defaulters named and shamed – Is someone you know on the list?
Abdominal Access Techniques with Prof. Dr. R K Mishra
GDM (1) (1).pptx small presentation for students
Insiders guide to clinical Medicine.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
O5-L3 Freight Transport Ops (International) V1.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Cell Structure & Organelles in detailed.
Sports Quiz easy sports quiz sports quiz
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
VCE English Exam - Section C Student Revision Booklet
master seminar digital applications in india
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPH.pptx obstetrics and gynecology in nursing
Cell Types and Its function , kingdom of life
Pharma ospi slides which help in ospi learning

Wireless sensor networks

  • 2. Introduction • In this paper, we focus on defending against the wormhole attack in the DV-Hop localization process, i.e., overcoming the impacts of the wormhole attack on the DV- Hop localization. • We propose a label-based secure localization scheme which is wormhole attack resistant based on the DV-Hop localization process.
  • 3. OBJECTIVE OF LABEL BASED SECURE LOCALIZATION • We analyze the impact of the wormhole attack on the DV-Hop localization process. • We propose a wormhole attack resistant approach that can remove the packets delivered through the wormhole link to achieve secure localization.
  • 4. Literature Review Existing System • Wormhole attack detection algorithm using a hop counting technique as a probe procedure, reconstructing a local map for each node and using a “diameter” feature to detect abnormalities caused by wormholes. continued…
  • 5. Literature Review • The wormhole attack detection scheme adopts the maximum number of independent neighbors of two non-neighbor nodes. • Existing Wormhole attacks can negatively affect the localization in wireless sensor networks.
  • 6. Proposed System • We describe our proposed wormhole attack resistant localization scheme, called label- based DV Hop localization. • The label-based DV-Hop localization scheme includes three phases, beacon nodes labeling, sensor nodes labeling, and DV-Hop-based secure localization.
  • 7. Proposed System(continued) • The beacon nodes are differentiated and labeled according to their geographic relationship under a wormhole attack. • After eliminating the illegal connections among the labeled neighboring nodes which are contaminated by the wormhole attack, the DV Hop localization procedure can be successfully conducted.
  • 8. System Requirments HARDWARE REQUIREMENTS: Processor : Pentium IV 2.8GHz. RAM : 512 MB RAM. Hard Disk : 40 GB. Input device : Keyboard and Mouse. Output device : VGA and High Resolution Monitor.
  • 9. System Requirments SOFTWARE REQUIREMENTS: Operating System : Windows XP Language : JDK 1.5.
  • 14. DV-HOP LOCALIZATION The main idea of our scheme is to generate a pseudo neighbor list for each beacon node, use all pseudo neighbor lists received from neighboring beacon nodes to classify all attacked nodes into different groups, and then label all neighboring nodes (including beacons and sensors). According to the labels of neighboring nodes, each node prohibits the communications with its pseudo neighbors, which are attacked by the wormhole attack.
  • 15. WORMHOLE ATTACK We address the Security issue of the wormhole attack upon the range-free DV-Hop based localization process. We analyze the impacts of wormhole attack on DV-Hop localization scheme. Based on the basic DV- Hop localization process, we propose a label- based secure localization scheme to defend against the wormhole attack.
  • 16. BASIC DV-HOP LOCALIZATION “Basic DV-Hop Localization without Wormhole Attack” indicates the relative localization error for the DV-Hop localization scheme when there is no wormhole attack. We can see that the curve is quite stable when the ratio of beacons to sensors varies, which suggests that the accuracy of the DV-hop localization is insensitive to the number of beacons in the network. Therefore, this curve is used as the reference when the wormhole attack exists.
  • 17. LABEL-BASED DV-HOP LOCALIZATION We propose a label-based secure localization scheme to defend against the wormhole attack. Simulation results demonstrate that our proposed secure localization scheme is capable of detecting the wormhole attack and resisting its adverse impacts with a high probability.
  • 18. Conclusion We analyze the severe impacts of the wormhole attack on the DV-Hop based localization in wirelesssensor networks. To tackle this secure problem, wepropose a label- based secure localization scheme to detect and resist the wormhole attack for the DV- Hop localization process. We also conduct simulations to demonstrate the effectiveness of our proposed scheme under different network parameters.
  • 19. FUTURE ENHANCEMENT The proposed scheme works well in the scenario when the network has no packet loss, and the transmission ranges of all nodes are identical. In our future work, we will extend our secure localization scheme to tolerate the packet loss. Also, we will consider the scenario when different types of nodes have different transmission ranges.
  • 20. REFERENCES • H. Chen, W. Lou, and Z. Wang, “A Consistency-based Secure Localization Scheme AgainstWormhole Attacks in WSNs,”in Proc. of the International Conference on Wireless Algorithms, Systems and Applications (WASA), 2009. • H. Chen, W. Lou, X. Sun, and Z. Wang, “A Secure Localization Approach Against Wormhole Attacks Using Distance Consistency,” Eurasip Journal on Wireless Communications and Networking, Spacial Issue on Wireless Network Algorithms, Systems, and Applications, 2009.
  • 21. REFERENCES(continued) W. Wang and A. Lu, “Interactive wormhole detection and evaluation,”Information Visualization, vol. 6, no. 1, pp. 3–17, 2007. ——, “HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 233–246, 2006. S. Capkun, M. Cagalj, and M. Srivastava, “Secure Localization With Hidden and Mobile Base Stations,” in Proc. of IEEE INFOCOM, 2006.