Wormhole and Sybil Attack in WSN: A Review

被引:0
作者
Goyal, Svarika [1 ]
Bhatia, Tarunpreet [1 ]
Verma, A. K. [1 ]
机构
[1] Thapar Univ, Patiala, Punjab, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM) | 2015年
关键词
Attacks; Defensive Mechanisms; Sybil attack; Wormhole attack; WSN;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing popularity of mobile devices, recent developments in wireless communication and the deployment of wireless sensor networks in the hostile environment makes it the popular field of interest from research perspective. Sensor networks consist of 'smart nodes' communicating wirelessly which are resources constrained in terms of memory, energy, computation power. The design of these networks must encounter all factors including fault tolerance capability, scalability, costs of production, operating environment, hardware constraints etc. However, due to wireless nature of these networks and no tamper-resistant hardware these are vulnerable to various types of attacks. In this paper, various types of attacks have been studied and defensive techniques of one of the severe attacks i.e. wormhole and Sybil are surveyed in major detail with the comparison of merits and demerits of several techniques.
引用
收藏
页码:1463 / 1468
页数:6
相关论文
共 17 条
[1]  
[Anonymous], AD HOC NETW, DOI DOI 10.1016/S1570-8705(03)00008-8
[2]  
[Anonymous], 2011, INT J COMPUTER SCI E
[3]  
Balachandran N., 2012, ADV NETWORKING APPL, V4, P84
[4]  
Benjie C., 2002, ACM WIRELESS NETWORK, V8
[5]  
Buch D., 2011, INT J NETWORK SECURI, V3, P525
[6]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[7]  
Demirbas Murat., 2006, Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, P564
[8]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[9]  
Eriksson Jakob, 2006, 2006 14th IEEE International Conference on Network Protocols, P75
[10]  
Gupta S., 2011, 2011 International Conference on Innovations in Information Technology (IIT), P226, DOI 10.1109/INNOVATIONS.2011.5893822