2011
DOI: 10.3844/jcssp.2011.973.979
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Sybil and Wormhole Attacks in Location Based Geographic Multicast Routing Protocol for Wireless Sensor Networks

Abstract:
Problem statement: Wireless sensor networks have been used in many applications, such as home automation, military surveillances and entity tracking systems. The sensor nodes have low computational capabilities and are highly resource constrained. Routing protocols of wireless sensor networks are prone to various routing attacks, such as black hole, rushing, wormhole, Sybil and denial of service attacks. Approach: The objective of this study was to examine… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…The wireless nodes have low computational capabilities and are highly resource constrained. Routing protocols of wireless networks are prone to various routing attack, such as black hole, rushing and Denial of Service (DoS) attacks (Ramachandran and Shanmugan, 2011). There is an improved risk of security attacks, to defeat concealed attacks there is a necessity to authenticate both access points and wireless stations (Moorthy and Sathiyabama, 2012).…”
Section: General Discussion and Related Workmentioning
confidence: 99%
“…The wireless nodes have low computational capabilities and are highly resource constrained. Routing protocols of wireless networks are prone to various routing attack, such as black hole, rushing and Denial of Service (DoS) attacks (Ramachandran and Shanmugan, 2011). There is an improved risk of security attacks, to defeat concealed attacks there is a necessity to authenticate both access points and wireless stations (Moorthy and Sathiyabama, 2012).…”
Section: General Discussion and Related Workmentioning
confidence: 99%
“…Impact of Sybil and Wormhole Attacks in WSN was analyzed in [19] with assists of Location Based Geographic Multicast Routing Protocol. A channel-based authentication technique was designed in [20] to detect Sybil attacks in wireless networks, utilizing the uniqueness of channel responses in the rich-scattering environment.…”
Section: Related Workmentioning
confidence: 99%
“…Algorithms proposed in [14][15][16] use the concept of common neighbors to detect Sybil nodes. In [17], another algorithm is proposed for detecting Sybil attack to multicast routing protocols based on geographic location. In [18], a method is developed which collects routes' information using Swarm Intelligence algorithm during network operation and detects Sybil nodes through their energy changes in the course of network activity.…”
Section: A Related Workmentioning
confidence: 99%
“…Also, in [17][18][19] algorithms are proposed for detecting Sybil nodes in mobile sensor networks. In [17], a centralized…”
Section: Introductionmentioning
confidence: 99%