A Scheme for Detection of High Transmission Power Based Wormhole Attack in WSN

被引:0
|
作者
Dwivedi, Rajendra Kumar [1 ]
Sharma, Prachi [1 ]
Kumar, Rakesh [1 ]
机构
[1] Madan Mohan Malaviya Univ Technol, Dept Comp Sci & Engn, Gorakhpur, Uttar Pradesh, India
来源
2018 5TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (UPCON) | 2018年
关键词
WSN; RSSI; Sink; Security; Wormhole Attack; RSSI;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Wireless sensor network (WSN) is a network of sensors which are deployed in a surrounding to sense any physical phenomenon. These nodes can be deployed randomly or manually. Usually, randomized deployment is done in hard to reach territories and manual deployment is done in easy to reach areas. This emerging technology has several applications however, it also has several issues viz., power efficiency, scalability, responsiveness, reliability and security etc. Wormhole attack is one of such issues related to network security. This attack is done at network layer. There are various modes of this attack. Among these modes, wormhole attack based on high transmission power is focused in this paper. Here, we proposed a scheme for detection of this type of wormhole attack by using Received Signal Strength Indicator (RSSI) and the results of simulation are shown with various performance metrics.
引用
收藏
页码:826 / 831
页数:6
相关论文
共 50 条
  • [1] A Mitigation Technique for High Transmission Power based Wormhole Attack in Wireless Sensor Networks
    Sharma, Mayank Kumar
    Joshi, Brijendra Kumar
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [2] Wormhole and Sybil Attack in WSN: A Review
    Goyal, Svarika
    Bhatia, Tarunpreet
    Verma, A. K.
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1463 - 1468
  • [3] A Novel Detection and Localization Scheme for Wormhole Attack in Internet of Things
    Tong, Fei
    Chen, Cheng
    Pan, Jianping
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 7141 - 7152
  • [4] Countermeasures for Selective Forwarding and Wormhole Attack in WSN
    Khandare, Pravin
    Sharma, Yogesh
    Sakhare, S. R.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 777 - 783
  • [5] A Two-Phase Wormhole Attack Detection Scheme in MANETs
    Shamaei, Shiva
    Movaghar, Ali
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 183 - 191
  • [6] Wormhole Attack Detection In Routing Protocol For Low Power Lossy Networks
    Ahsan, Muhammad Saad
    Bhutta, Muhammad Nasir Mumtaz
    Maqsood, Moazam
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2017, : 58 - 67
  • [7] A detection method of wormhole attack in power communication sensor networks based on hops
    Yuan, Jie
    Yan, Binyuan
    WEB INTELLIGENCE, 2023, 21 (02) : 115 - 125
  • [8] Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning
    Alshehri, Asma Hassan
    PeerJ Computer Science, 2024, 10 : 1 - 22
  • [9] Detecting wormhole attack on data aggregation in hierarchical WSN
    Kumar M.
    Dutta K.
    International Journal of Information Security and Privacy, 2017, 11 (01): : 35 - 51
  • [10] Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning
    Alshehri, Asma Hassan
    PEERJ COMPUTER SCIENCE, 2024, 10