A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks

Article ID

CSTNWS257PY

A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks

Akanksha Gupta
Akanksha Gupta
Anuj K. Gupta
Anuj K. Gupta
DOI

Abstract

Wireless Sensor Networks refers to a multi-hop packet based network that contains a set of mobile sensor nodes. Every node is free to travel separately on any route and can modify its links to other nodes. Therefore, the network is self organizing and adaptive networks which repeatedly changes its topology. The relations among nodes are restricted to their communication range, and teamwork with intermediate nodes is necessary for nodes to forward the packets to other sensor nodes beyond their communication range. The network’s broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routingdisruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from these attack.

A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks

Wireless Sensor Networks refers to a multi-hop packet based network that contains a set of mobile sensor nodes. Every node is free to travel separately on any route and can modify its links to other nodes. Therefore, the network is self organizing and adaptive networks which repeatedly changes its topology. The relations among nodes are restricted to their communication range, and teamwork with intermediate nodes is necessary for nodes to forward the packets to other sensor nodes beyond their communication range. The network’s broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routingdisruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from these attack.

Akanksha Gupta
Akanksha Gupta
Anuj K. Gupta
Anuj K. Gupta

No Figures found in article.

Akanksha Gupta. 2014. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 14 Issue E1
Pg. 23- 31
Classification
Not Found
Article Matrices
Total Views: 9194
Total Downloads: 2374
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks

Akanksha Gupta
Akanksha Gupta
Anuj K. Gupta
Anuj K. Gupta

Research Journals