Open Access Open Access  Restricted Access Subscription Access

Wormhole Attack Detection in Wireless Sensor Networks: A Survey


 

Wireless sensors networks (WSNs) consist of a large number of tiny, spatially distributed, and autonomous devices, called sensor nodes. The nodes are densely deployed. The ad hoc nature of WSNs, their deployment in hostile areas, and their physical interaction with environment, make them vulnerable to several types of security attacks. One of the most important attacks in WSNs is the wormhole attack in which a malicious node receives packets from one location and tunnels them to another location in the network. Wormhole attack can be achieved with the help of several techniques such as packet encapsulation, high transmission power and high quality communication links etc. In this paper, we have surveyed various existing techniques to detect wormhole attack in wireless sensor networks. 


Keywords

Wormhole, Tunneling, Security, Malicious node
User
Notifications
Font Size

Abstract Views: 136

PDF Views: 0




  • Wormhole Attack Detection in Wireless Sensor Networks: A Survey

Abstract Views: 136  |  PDF Views: 0

Authors

Abstract


Wireless sensors networks (WSNs) consist of a large number of tiny, spatially distributed, and autonomous devices, called sensor nodes. The nodes are densely deployed. The ad hoc nature of WSNs, their deployment in hostile areas, and their physical interaction with environment, make them vulnerable to several types of security attacks. One of the most important attacks in WSNs is the wormhole attack in which a malicious node receives packets from one location and tunnels them to another location in the network. Wormhole attack can be achieved with the help of several techniques such as packet encapsulation, high transmission power and high quality communication links etc. In this paper, we have surveyed various existing techniques to detect wormhole attack in wireless sensor networks. 


Keywords


Wormhole, Tunneling, Security, Malicious node