Downloads: 109 | Views: 270
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015 | Popularity: 6.8 / 10
Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks
Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal
Abstract: Distributed Sensor Networks (DSN) is an emerging technology and has a wide range of applications such as Environment (habitat) monitoring, Seismic monitoring, Terrain Surveillance, etc. The security of a sensor network is a critical aspect because of the random deployment of sensor nodes in an unattended environment. Distributed sensor networks are vulnerable against various types of external and internal attacks being limited by computation resources, smaller memory capacity, limited battery life, processing power & lack of tamper resistant packaging. The networks broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routing-disruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from this attack. Hello flood attack, Denial of service attacks, wormhole attack, Distributed Sensor Networks
Keywords: Hello flood attack, Denial of service attacks, wormhole attack, Distributed Sensor Networks
Edition: Volume 4 Issue 2, February 2015
Pages: 1422 - 1430
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 102
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2203 - 2208Review on MANETs Characteristics, Challenges, Application and Security Attacks
Anuj Rana, Sandeep Gupta
Downloads: 102
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1612 - 1616Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks
Vishal Mahale, Deepali Gothawal
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2386 - 2390GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS
Santosh S. Doifode, D. C. Mehetre
Downloads: 106
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 735 - 737Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks
Nikhita Nerkar, Vina M Lomte
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1823 - 1826Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2
Manju Ojha, Dr. Rajendra Singh Kushwah