International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015


Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi | Dr. Krishnamurthy G. N | Dr. Nandini Sidnal


Abstract: Distributed Sensor Networks (DSN) is an emerging technology and has a wide range of applications such as Environment (habitat) monitoring, Seismic monitoring, Terrain Surveillance, etc. The security of a sensor network is a critical aspect because of the random deployment of sensor nodes in an unattended environment. Distributed sensor networks are vulnerable against various types of external and internal attacks being limited by computation resources, smaller memory capacity, limited battery life, processing power & lack of tamper resistant packaging. The networks broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routing-disruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from this attack. Hello flood attack, Denial of service attacks, wormhole attack, Distributed Sensor Networks


Keywords: Hello flood attack, Denial of service attacks, wormhole attack, Distributed Sensor Networks


Edition: Volume 4 Issue 2, February 2015,


Pages: 1422 - 1430


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal, "Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 1422-1430, https://www.ijsr.net/get_abstract.php?paper_id=SUB151500

Similar Articles with Keyword 'wormhole attack'

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana | Sandeep Gupta [3]

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha | Dr. Rajendra Singh Kushwah

Share this Article
Top