2021
DOI: 10.11591/csit.v2i1.p33-42
|View full text |Cite
|
Sign up to set email alerts
|

Survey of wormhole attack in wireless sensor networks

Abstract: From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 31 publications
(39 reference statements)
0
16
0
Order By: Relevance
“…The attacker node in the gray hole receives data from the source node, but it is not sent to the target node [16]. The attacker node just drops some packets [24]. The following two scenarios are reviewed to determine whether the data transmitted is normal or not.…”
Section: Gray Holementioning
confidence: 99%
“…The attacker node in the gray hole receives data from the source node, but it is not sent to the target node [16]. The attacker node just drops some packets [24]. The following two scenarios are reviewed to determine whether the data transmitted is normal or not.…”
Section: Gray Holementioning
confidence: 99%
“…A. Wormhole using packet encapsulation [3], [4], [17] In encapsulation-based wormhole attacks, there are several nodes between two malicious nodes, and data packets are encapsulated between them. Since encapsulated data packets are sent between malicious nodes, the actual number of hops does not increase during the crawl.…”
Section: Approaches Wormhole Attack Detectionmentioning
confidence: 99%
“…B. A wormhole using a high quality / out-of-band channel [3], [4], [17] In this mode, a wormhole attack is launched using high-quality single-span out-of-band communication (called a tunnel) between malicious nodes. This tunnel can be achieved, for example, using a straight wired communication line or a long-range directional wireless communication line.…”
Section: Approaches Wormhole Attack Detectionmentioning
confidence: 99%
See 2 more Smart Citations