2016
DOI: 10.1155/2016/8354930
|View full text |Cite
|
Sign up to set email alerts
|

WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks

Abstract: Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(47 citation statements)
references
References 32 publications
0
47
0
Order By: Relevance
“…On the off chance that hub does not forward the parcel to hub after a limit, at that point watch dog method pronounces that hub is noxious. Therefore, another course from hub in the system to hub is found to disengage the vindictive hub B [16].…”
Section: A Watchdog Techniquementioning
confidence: 99%
See 2 more Smart Citations
“…On the off chance that hub does not forward the parcel to hub after a limit, at that point watch dog method pronounces that hub is noxious. Therefore, another course from hub in the system to hub is found to disengage the vindictive hub B [16].…”
Section: A Watchdog Techniquementioning
confidence: 99%
“…Any center point that lies in the joining of above zones can hear messages from both. These centers can pick regardless of whether center propels messages or not [16].…”
Section: Fig : Watchdog Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…For protecting and detecting these possible threats, an intrusion detection and prevention system must be used by the wireless networks. Intrusion detection system solution is also important for the organizations which do not have a WLAN due to the dangerous wireless threats [1, 18,22,24,25,26]. A misbehaving Wireless Access Point (WAP) is introduced into the wireless networks 802.11which attacks and collects the sensitive data from the WLAN.…”
Section: Threats To Wireless Lanmentioning
confidence: 99%
“…Proposed algorithm in [35] takes advantages of both watchdog and Delphi methods to detect wormhole attack. To find the probability of wormhole presence, it calculates packet loss and time delay probability of the established path.…”
Section: ) Wormhole Resistant Hybrid Techniquementioning
confidence: 99%