Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal

Distributed Sensor Networks (DSN) is an emerging technology and has a wide range of applications such as Environment (habitat) monitoring, Seismic monitoring, Terrain Surveillance, etc. The security of a sensor network is a critical aspect because of the random deployment of sensor nodes in an unattended environment. Distributed sensor networks are vulnerable against various types of external and internal attacks being limited by computation resources, smaller memory capacity, limited battery life, processing power & lack of tamper resistant packaging. The networks broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routing-disruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from this attack. Hello flood attack, Denial of service attacks, wormhole attack, Distributed Sensor Networks

Keywords: Hello flood attack, Denial of service attacks, wormhole attack, Distributed Sensor Networks

Edition: Volume 4 Issue 2, February 2015

Pages: 1422 - 1430

Share this Article

How to Cite this Article?

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal, "Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151500, Volume 4 Issue 2, February 2015, 1422 - 1430

112 PDF Views | 90 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'wormhole attack'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1422 - 1430

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article
Top