Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 297

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015 | Popularity: 6.8 / 10


     

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal


Abstract: Distributed Sensor Networks (DSN) is an emerging technology and has a wide range of applications such as Environment (habitat) monitoring, Seismic monitoring, Terrain Surveillance, etc. The security of a sensor network is a critical aspect because of the random deployment of sensor nodes in an unattended environment. Distributed sensor networks are vulnerable against various types of external and internal attacks being limited by computation resources, smaller memory capacity, limited battery life, processing power & lack of tamper resistant packaging. The networks broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routing-disruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from this attack. Hello flood attack, Denial of service attacks, wormhole attack, Distributed Sensor Networks


Keywords: Hello flood attack, Denial of service attacks, wormhole attack, Distributed Sensor Networks


Edition: Volume 4 Issue 2, February 2015


Pages: 1422 - 1430



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal, "Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 1422-1430, https://www.ijsr.net/getabstract.php?paperid=SUB151500, DOI: https://www.doi.org/10.21275/SUB151500

Similar Articles

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1956 - 1959

Clone Attack Detection in MWSN Using Neighbor Node Information

Ashe Kiran, Deepinder Dhaliwal

Share this Article

Downloads: 115

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this Article
Top