Detection methods for wormhole attack in WSN |
Author(s): |
| Dhaval N. Tandel , SVMIT Bharuch; Bhavin I. Shah, SVMIT Bharuch |
Keywords: |
| Wormhole Attack, WSN, Security, Localization, Authentication |
Abstract |
|
Wireless communication technique has become an important tool in any application that requires communication between one or more senders and multiple receivers. Security is becoming a major concern for this wireless communication. Wireless sensor networks consist of a large number of small sensor nodes that constantly monitors environmental conditions but due to the partial resources of the nodes and hostile & pervasive environments. so this kind of nature of wireless sensor networks make them very attractive to attacks at all network layers; however, the so-called “wormhole attackâ€. In wormhole an attacker receives packets at one point in the network, “tunnels†them to another point in the network, and then replays them into the network from that point. In this paper, we will study wormhole attack and some of the methods for detecting of wormhole attack. |
Other Details |
|
Paper ID: IJSRDV3I80404 Published in: Volume : 3, Issue : 8 Publication Date: 01/11/2015 Page(s): 799-803 |
Article Preview |
|
|
|
|
