2013
DOI: 10.5120/13011-0309
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode

Abstract: Due to dynamic topology and non-wired infrastructure of Wireless Sensor Networks (WSN), they are prone to attacks. Wormhole attack is one of the most popular and serious attack in WSNs. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multi-path route. This paper proposes promiscuous mode method to detect and isolate the malicious node during wormhole attack by usi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 13 publications
(11 reference statements)
0
1
0
Order By: Relevance
“…When the wormhole attack is present [14], [15], [16] and [17], a malicious node intercepts messages in one part of the network then tunnels them over a low latency link (wired link or a high RF band) and replays them in a different far away part of the network. A typical wormhole attack requires two or more attackers [18] malicious nodes -who have better communication resources than regular sensor nodes [19].…”
Section: Wormhole Attacksmentioning
confidence: 99%
“…When the wormhole attack is present [14], [15], [16] and [17], a malicious node intercepts messages in one part of the network then tunnels them over a low latency link (wired link or a high RF band) and replays them in a different far away part of the network. A typical wormhole attack requires two or more attackers [18] malicious nodes -who have better communication resources than regular sensor nodes [19].…”
Section: Wormhole Attacksmentioning
confidence: 99%