High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Detection methods for wormhole attack in WSN

Author(s):

Dhaval N. Tandel , SVMIT Bharuch; Bhavin I. Shah, SVMIT Bharuch

Keywords:

Wormhole Attack, WSN, Security, Localization, Authentication

Abstract

Wireless communication technique has become an important tool in any application that requires communication between one or more senders and multiple receivers. Security is becoming a major concern for this wireless communication. Wireless sensor networks consist of a large number of small sensor nodes that constantly monitors environmental conditions but due to the partial resources of the nodes and hostile & pervasive environments. so this kind of nature of wireless sensor networks make them very attractive to attacks at all network layers; however, the so-called “wormhole attack”. In wormhole an attacker receives packets at one point in the network, “tunnels” them to another point in the network, and then replays them into the network from that point. In this paper, we will study wormhole attack and some of the methods for detecting of wormhole attack.

Other Details

Paper ID: IJSRDV3I80404
Published in: Volume : 3, Issue : 8
Publication Date: 01/11/2015
Page(s): 799-803

Article Preview

Download Article