International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 72 - Number 1 |
Year of Publication: 2013 |
Authors: Hosam Soleman, Ali Payandeh, Nasser Mozayyani, Saeed Sedighian Kashi |
10.5120/12462-8821 |
Hosam Soleman, Ali Payandeh, Nasser Mozayyani, Saeed Sedighian Kashi . Packet Flow Rate to Protect Wireless Sensor Networks from Wormhole and Hello Flood Attacks. International Journal of Computer Applications. 72, 1 ( June 2013), 45-51. DOI=10.5120/12462-8821
The increased deployment of ubiquitous wireless sensor (WSN) networks has exponentially increased the complexity to detect wireless sensor network attacks and protect against them. Wormhole and hello flood attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. Hello flood attack is an important attack on the network layer, in which an adversary, which is not a legal node in the network, can flood hello request to any legitimate node using high transmission power and break the security of WSNs. This paper describes detection algorithms for wireless sensor networks, which detects wormholes and hello flood attacks based on the packet flow rate to base station node in the network. Simulation results show that the algorithms have low false toleration and false detection rates and small time to detect attacks.