Detection of Wormhole Attack in Wireless Sensor Networks

被引:1
作者
Yadav, Jyoti [1 ]
Kumar, Mukesh [1 ]
机构
[1] Technol Inst Text & Sci, Bhiwani, India
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1 | 2016年 / 408卷
关键词
Ad hoc; WSN; Wormhole;
D O I
10.1007/978-981-10-0129-1_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although Secure routing is the demand of the hour in the application of wireless sensor networks (WSN), secure routing is a challenge in itself due to the inherently limited capacities of sensor nodes. Routing attacks are a major challenge in the process of designing of effective and robust security mechanisms for WSNs. This main focus of this paper is on wormhole routing attack. The measures which have been proposed till now to counter the routing attacks suffer from flaws that essentially prove the fact that they are not good enough for use in large-scale WSN deployments. We need light weight and hard-bearing security mechanisms due to inherent limitations found in WSNs. In this paper, we discuss a wormhole detection method: WGDD (wormhole geographic distributed detection).
引用
收藏
页码:243 / 250
页数:8
相关论文
共 10 条
[1]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[2]  
Bojkovic Zoran S., 2008, INT J COMMUNICATIONS, V2
[3]   Routing security in wireless ad hoc networks [J].
Deng, HM ;
Li, W ;
Agrawal, DP .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) :70-75
[4]  
Hanapi Z. M., 2009, WORLD ACAD SCI ENG T, V3
[5]  
Kavitha T., 2010, J INF ASSUR SECUR, V5, P31
[6]   Key management issues in wireless sensor networks: Current proposals and future developments [J].
Lee, Johnson C. ;
Leung, Victor C. M. ;
Wong, Kirk H. ;
Cao, Jiannong ;
Chan, Henry C. B. .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) :76-84
[7]  
Naeem Tahir, 2009, INT J DIGITAL CONTEN, V3, P89
[8]  
Padmavathi G., 2009, IJCSIS INT J COMPUTE, V4
[9]  
Raj P. N., 2009, INT J COMPUTER SCI I, V2
[10]  
Rehana J., 2009, T1105190 TKK U TECHN