2017 International Conference on Inventive Systems and Control (ICISC) 2017
DOI: 10.1109/icisc.2017.8068635
|View full text |Cite
|
Sign up to set email alerts
|

Countermeasures for selective forwarding and wormhole attack in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Attackers can also impersonate network nodes by counterfeiting, and conceal legitimate users to execute unauthorized operations. The active attacks include jamming attack [15], denial of service attack, black hole attack [16], tampering attack, wormhole attack [17], selective forwarding, identity replication/cloning attack [18], Sybil attack [19], etc. The passive attack is difficult to detect for the simple reason that the attacker only monitors the transmitted data without modifying the message.…”
Section: Security Threat In Clustered Wireless Sensor Networkmentioning
confidence: 99%
“…Attackers can also impersonate network nodes by counterfeiting, and conceal legitimate users to execute unauthorized operations. The active attacks include jamming attack [15], denial of service attack, black hole attack [16], tampering attack, wormhole attack [17], selective forwarding, identity replication/cloning attack [18], Sybil attack [19], etc. The passive attack is difficult to detect for the simple reason that the attacker only monitors the transmitted data without modifying the message.…”
Section: Security Threat In Clustered Wireless Sensor Networkmentioning
confidence: 99%
“…In Wormhole attack the malicious node will send packets to the other malicious node by creating the tunnelling [3][4][5][6][7]. It will transfer the packet from one location to the different location [8].It will disrupt the network very largely. The tunnel has more power to transmit the packets compared to the normal routing.…”
Section: Wormhole Attackmentioning
confidence: 99%
“…It can combine with the other attacks like the sinkhole attack and cause serious damage to the network. Wormhole attack can be a various forms such as [8] 1. Wormhole by using the Encapsulation.…”
Section: Wormhole Attackmentioning
confidence: 99%
“…The wormhole attack can damage the routing structure and interfere with the routing for data transmission [4]. A wormhole link usually consists of two or more designated attack nodes [5,6]. Because the wormhole attack has no effect on communication integrity, it is difficult to be detected [7].…”
Section: Introductionmentioning
confidence: 99%