2011
DOI: 10.5121/ijnsa.2011.3507
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of Wormhole Attack in Wireless Sensor Network

Abstract: Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole at… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…They can also spy on the packets going through and use the large amount of collected informat ion to break any network security. The wormho le attack [3] will also affect connectivity-based localization algorith ms and protocols based on localization, like geographic routing, will find many inconsistencies resulting in further network d isruption.…”
Section: Fig-14 Wormhole Attackmentioning
confidence: 99%
“…They can also spy on the packets going through and use the large amount of collected informat ion to break any network security. The wormho le attack [3] will also affect connectivity-based localization algorith ms and protocols based on localization, like geographic routing, will find many inconsistencies resulting in further network d isruption.…”
Section: Fig-14 Wormhole Attackmentioning
confidence: 99%