Label-Based DV-Hop Localization against Wormhole Attacks

Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, etc. Basically, the DV-Hop localization mechanism can work well with the assistance of beacon nodes that have the capability of self-positioning. However, if the network is invaded by a wormhole attack, the attacker can tunnel the packets via the wormhole link to

cause severe impacts on the DV-Hop localization process. The distance-vector propagation phase during the DVHop localization even aggravates the positioning result, compared to the localization schemes without wormhole attacks. In this paper, we analyze the impacts of wormhole attack on DV-Hop localization scheme. Based on the basic DV-Hop localization process, we propose a label-based secure localization scheme to defend against the wormhole attack. Simulation results demonstrate that our proposed secure localization scheme is capable of detecting the wormhole attack and resisting its adverse impacts with a high probability.


Algorithm used:


 Wormhole attack detection algorithm


Existing System:


Existing system the wormhole attack can disturb the first two phases of the DV-Hop localization. In the first phase, a sensor may obtain a smaller hop-countsto beacons. In the second phase, a beacon may calculate an incorrect hop-size, which is delivered to its neighboring sensors. Finally, each sensor may use incorrect hop-counts and hop-size to estimate the distances to all the beacons for the self-localization.


 Proposed System:


As sensors networks usually work in a hostile environ- ment, they are vulnerable to various malicious attacks. The wormhole attack, as a typical external attack, can be easily launched by two colluding attackers without the system’s authorization. When such attack is initiated, one attacker tunnels its received packets to another attacker, thus, packets can be delivered through a shorter path. The wormhole attack can deteriorate the DV-Hop localization dramatically. It not only reduces the hop-counts to all the beacons in the network, but also contaminates the average distance per hop. As a result, the location estimate will be far away from precision.


In this paper, we focus on defending against the wormhole attack in the DV-Hop localization process, i.e., overcoming the impacts of the wormhole attack on the DV-Hop localization. We propose a label-based secure localization scheme which is wormhole attack resistant based on the DV-Hop localization process. The main idea of our scheme is to generate a pseudo neighbor list for each beacon node, use all pseudo neighbor lists received from neighboring beacon nodes to classify all attacked nodes into different groups, and then label all neighboring nodes (including beacons and sensors). According to the labels of neighboring nodes, each node prohibits the communications with its pseudo neighbors, which are attacked by the wormhole attack.


Flow diagram 1


Fig: wormhole attack on DVHop localization.


Flow diagram 2


Fig : The flowchart of the label-based DVHop localization



The main contributions of this Project include:


(1)We analyze the impact of the wormhole attack on the DV-Hop localization process;

(2)We propose a wormhole attack resistant approach that can remove the packets delivered through the wormhole link to achieve secure localization;


(3)We conduct the simulation to validate the effectiveness of our proposed secure localization scheme.


Hardware Required



  • SYSTEM                      : Pentium IV 2.4 GHz
  • HARD DISK                : 40 GB
  • FLOPPY DRIVE         : 1.44 MB
  • MONITOR                   : 15 VGA colour
  • MOUSE                        : Logitech.
  • RAM                                      : 256 MB
  • KEYBOARD               : 110 keys enhanced.


Software Required


  • O/S                     : Windows XP, Windows 7,Windows Vista


  • Language           : Java, J2ME (J2ME Wireless Toolkit)


  • Data Base          : Mysql 5.0 or MS-ACCESS

Tags :
Your rating: None Average: 4.5 (2 votes)