2016 SAI Computing Conference (SAI) 2016
DOI: 10.1109/sai.2016.7556151
|View full text |Cite
|
Sign up to set email alerts
|

Wormhole attack detection in wireless sensor networks

Abstract: Security is one of the major and important issues surrounding network sensors because of its inherent liabilities, i.e. physical size. Since network sensors have no routers, all nodes involved in the network must share the same routing protocol to assist each other for the transmission of packets. Also, its unguided nature in dynamic topology makes it vulnerable to all kinds of security attack , thereby posing a degree of security challenges. Wormhole is a prominent example of attacks that poses the greatest t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…This message shows to the neighboring nodes of B, that A is near them as well [145,125]. In this way, the interchanged control packets among them [146] cause to create non-existing roads according to packets.…”
Section: Availability Attacks and Proposed Solutionsmentioning
confidence: 97%
“…This message shows to the neighboring nodes of B, that A is near them as well [145,125]. In this way, the interchanged control packets among them [146] cause to create non-existing roads according to packets.…”
Section: Availability Attacks and Proposed Solutionsmentioning
confidence: 97%
“…This means that it affects normal nodes that exist between two malicious nodes. These effects not only transmit misrouting information and deplete resources but also result in unfair resource allocation by accessing sensitive information [59].…”
Section: ) Wormholementioning
confidence: 99%
“…A wormhole link usually consists of two or more designated attack nodes [5,6]. Because the wormhole attack has no effect on communication integrity, it is difficult to be detected [7]. There are three types of wormhole attack, including packets tampering, replaying data packets with high power, and out-of-band hidden channel [8,9].…”
Section: Introductionmentioning
confidence: 99%