2017
DOI: 10.21817/ijet/2017/v9i2/170902126
|View full text |Cite
|
Sign up to set email alerts
|

Wormhole Attacks and Countermeasures in Wireless Sensor Networks : A Survey

Abstract: Abstract-Wireless sensor networks can be deployed in inhospitable terrains or in hostile environments to provide continuous monitoring and processing capabilities. Due to the wireless and distributed nature, security is very crucial issue in wireless sensor network. Security comes from attacks. Detecting wormhole attack is very hard compared to other attacks because it uses private, out-of-band channel to launch the attack. To launch this type of attack, attacker does not require any cryptographic breaks. Worm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…It transfers through a private channel to another interesting node at the other end, which rebroadcasts the packet locally. The path for communication between source and target is preferred via the private channel due to better prediction, e.g., fewer hops or less time, relative to packets exchanged through other routes [7]. One component that was developed in the late 1950s by Artificial Intelligence was ML.…”
Section: Introductionmentioning
confidence: 99%
“…It transfers through a private channel to another interesting node at the other end, which rebroadcasts the packet locally. The path for communication between source and target is preferred via the private channel due to better prediction, e.g., fewer hops or less time, relative to packets exchanged through other routes [7]. One component that was developed in the late 1950s by Artificial Intelligence was ML.…”
Section: Introductionmentioning
confidence: 99%
“…8 Another survey 9 focused on the limitations and the parameters used in the prevention and mitigation techniques. In Abd El-mawla et al, 10 a number of security challenges are explored, whereas the authors in Patel et al 11 explore the different attacks of wormholes. They lack an in-depth analysis and provide no taxonomy of attack schemes.…”
mentioning
confidence: 99%