International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 270

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015 | Popularity: 6.8 / 10


     

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal


Abstract: Distributed Sensor Networks (DSN) is an emerging technology and has a wide range of applications such as Environment (habitat) monitoring, Seismic monitoring, Terrain Surveillance, etc. The security of a sensor network is a critical aspect because of the random deployment of sensor nodes in an unattended environment. Distributed sensor networks are vulnerable against various types of external and internal attacks being limited by computation resources, smaller memory capacity, limited battery life, processing power & lack of tamper resistant packaging. The networks broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routing-disruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from this attack. Hello flood attack, Denial of service attacks, wormhole attack, Distributed Sensor Networks


Keywords: Hello flood attack, Denial of service attacks, wormhole attack, Distributed Sensor Networks


Edition: Volume 4 Issue 2, February 2015


Pages: 1422 - 1430



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal, "Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 1422-1430, https://www.ijsr.net/getabstract.php?paperid=SUB151500



Similar Articles

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2386 - 2390

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre

Share this Article

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this Article



Top