Data Research, Vol. 2, Issue 2, Apr  2018, Pages 78-87; DOI: 10.31058/ 10.31058/

A Method for Identifying a Wormhole Attack Using Regression in Wireless Sensor Networks

, Vol. 2, Issue 2, Apr  2018, Pages 78-87.

DOI: 10.31058/

Seyyedjalaleddin Dastgheib 1*

1 Department of Computer Engineering, Shiraz University, Shiraz, Iran

Received: 17 July 2018; Accepted: 15 August 2018; Published: 29 August 2018

Download PDF | Views 415 | Download 249


Due to the specific features of wireless sensor networks (WSNs), such as a large number of nodes and limited energy, we need to use unique methods for this type of network in dealing with attacks. There are numerous attacks on WSNs that cause loss of network security. One of these attacks is setting the wrong path using a wormhole. A wormhole attack is triggered by two adversary nodes in such a way that the packets are broadcasted by an adversary to another adversary without decoding or separating each packet. Adversaries are directly linked to each other by a vast transmission range. In this thesis, we try to detect and neutralize this attack using regression. This paper presents a comprehensive approach that, in all conditions, without the need for additional equipment and with the highest accuracy and low energy consumption, can be detected and ultimately countered by the attack of the wormhole.


Wireless Sensor Network, Security, Wormhole Attacks, Regression


© 2017 by the authors. Licensee International Technology and Science Press Limited. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


[1] Marques, B.F.L.G. Application-Driven Wireless Sensor Networks. Doctoral dissertation, Universidade do Porto, 2017.‏

[2] Charalampidou, M.; Pavlidis, G.; Mouroutsos, S.G. A novel modular wireless sensor networks approach for security applications. International Journal of Security and Networks, 2017, 12(1), 40-50, DOI: 10.1504/ijsn.2017.10001807.‏

[3] Sabri, Y.; ElKamoun, N. GRPW-MuS-s: A Secure Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks. Communications on Applied Electronics (CAE), 2016, 6(5), 1-9, DOI: 10.5120/cae2016652472.‏

[4] Chen, H.; Lou, W.; Wang, Z.; Wu, J.; Wang, Z.; Xia, A. Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, 2015, 16, 22-35, DOI: 10.1016/j.pmcj.2014.01.007.

[5] Liu, L.; Luo, G.; Qin, K.; Zhang, X. An algorithm based on logistic regression with data fusion in wireless sensor networks. Journal on Wireless Communications and Networking, 2017, 2017(1), 10, DOI: 10.1186/s13638-016-0793-z.‏

[6] Lazos, L.; Poovendran, R.; Čapkun, S. ROPE: robust position estimation in wireless sensor networks. In Proceedings of the 4th IEEE international symposium on information processing in sensor networks, 2005, 1-43.‏

[7] Ban, X.; Sarkar, R.; Gao, J. Local connectivity tests to identify wormholes in wireless networks. In Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2011, 1-13.‏

[8] Zhang, T.; He, J.; Yu, H. Secure localization in wireless sensor networks with mobile beacons. International Journal of Distributed Sensor Networks, 2012, 8(10), 197-189, DOI: 10.1155/2012/732381.

[9] Dabi, P.S.; Tunwal, K.; Khandelwal, R.; Acharya, D. A Survey of Detection of Wormhole Attacks in Wireless Sensor Network. International Journal of Enhanced Research in Management & Computer Applications, 2014, 3(6), 52-55.

[10] Ughade, S.; Kapoor, R.K.; Pandey, A. An Overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts, and Detection Approach. International Journal of Recent Development in Engineering and Technology, 2014, 2(4), 102-109.

[11] Rajeswari, S.R.; Seenivasagam, V. Comparative study on various authentication protocols in wireless sensor networks. The Scientific World Journal, 2016, 2016(1), 1-6, DOI: 10.1155/2016/6854303.‏‏

[12] Amish, P.; Vaghela, V.B. Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia computer science, 2016, 79(1), 700-707, DOI: 10.1016/j.procs.2016.03.092 .

[13] Mukherjee, S.; Chattopadhyay, M.; Chattopadhyay, S.; Kar, P. Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network. Journal of Computer Networks and Communications, 2016, 2016(1), 1-15, DOI: /10.1155/2016/3405264.

Related Articles