CFP last date
20 May 2024
Reseach Article

A Review on Detection and Prevention of Wormhole Attack in Wireless Sensor Network

by Swati Bhagat, Trishna Panse
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 13
Year of Publication: 2015
Authors: Swati Bhagat, Trishna Panse
10.5120/ijca2015906568

Swati Bhagat, Trishna Panse . A Review on Detection and Prevention of Wormhole Attack in Wireless Sensor Network. International Journal of Computer Applications. 127, 13 ( October 2015), 1-4. DOI=10.5120/ijca2015906568

@article{ 10.5120/ijca2015906568,
author = { Swati Bhagat, Trishna Panse },
title = { A Review on Detection and Prevention of Wormhole Attack in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 13 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number13/22786-2015906568/ },
doi = { 10.5120/ijca2015906568 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:19:46.889743+05:30
%A Swati Bhagat
%A Trishna Panse
%T A Review on Detection and Prevention of Wormhole Attack in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 13
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless sensor network (WSNs) is ubiquitous and gets a lot of interest from researchers towards the best applications. Wormhole nodes are false routes that are shorter than the original route in the network it creates problem in routing mechanism, which rely on the facts about distance between nodes. The attacker node captures the packets from the legitimate nodes. In our proposed research work we identify the wormhole node by their high power transmission in the network and also put off the network from the wormhole by achieving confidentiality in our modified AODV.

References
  1. U.K. Chaurasia and versha singh.. MAODV: Modified wormhole detection AODV protocol, In the six international conference on contemporary computing, IEEE 2013.
  2. Z. A. Khan and M. H. Islam. Wormhole Attack: A new detection technique, In the International Conference on Emerging Technologies (ICET), IEEE 2012.
  3. M.G. Otero and A.P. Hernandez. Detection of Wormhole Attack in wireless Sensor Network Using Range- Free Localization, In the 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), IEEE 2012
  4. S. Gupta, S. Kar and S. Dharmraja. WHOP: Wormhole Attack Detection Protocol using Hound Packet, In the International Conference on Innovations in Information Technology (IIT), IEEE 2011.
  5. M. Jain and H. kandwal. A survey on complex Wormhole Attack in wireless Ad Hoc Networks, In the International Conference on Advances in computing, control and telecommunication technologies, IEEE 2009.
  6. S. Choi, D.Y. Kim, D.H .Lee and J.I. Jung. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks, In the International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE.
  7. L. Buttyan,L. Dora and I. Vajda. Statistical wormhole detection in sensor network, Springer-Verlag Berlin Heidelberg 2005,pp. 128-141.
  8. J. Sen. A survey on wireless sensor network security, In the international journal of communication network and information security, IJCNIS 2009.
  9. M. Azer, S.E. Kassas, M.E. Soudani. A Full image of the wormhole attack International Journal of Computer Science and Information Security, Vol. 1, No. 1, (IJCSIS) May 2009
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Wormhole Attack AODV.