Isolating Wormhole Attack in Wireless Sensor NetworksReportar como inadecuado

Isolating Wormhole Attack in Wireless Sensor Networks - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Wireless sensor networks WSNs are inclined to pretenders or challenger as they are persistently positioning the nodes in regular environments. The assailants can straightforwardly obtain unenthusiastically decisive information and in addition it accomplishes a number of malfunctions also. There are a number of precarious attacks and critical distortion in wireless sensor network. One of the widely held and unadorned attacks in wireless sensor networks is wormhole attack. This paper scrutinizes the developmental action of wormhole attack in wsn and studies the enactment of prior strategies of guarding mechanism available and then recommends intelligent based mechanism with the succor of QoS parameters. The contemplation of suggested mechanism is the observation of QoS parameter considerations between succeeding nodes in the network and those nodes obtained parametric assessment value which is compulsory necessitate to relate those values of other succeeding nodes with the support of swarm agents. The manifestation of wormhole attacks is recognized based on the two phase mechanisms. The principal strategy is that relates QoS parameter between succeeding nodes in the network, the nodes which are compromised by wormhole attack nodes are substantially larger than those between two standard nearest neighbor nodes with the assistance of sophisticated swarm agents. The additional strategy for perceiving wormhole attack is depending on the circumstance that accomplishes the enactment of agent nodes within its communication or transmission range by initiation of fresh connection links into the network. This strategy does not care about any unambiguous hardware, has greater performance, least overhead and also does not consume extra power. The proposed mechanism is modeled with an assistance of the AODV routing protocol, exploration and simulations of the proposed mechanism are carried out using the network simulator ns-2.


AODV, Swarm Agents, Wormhole Attacks, Wireless Sensor Networks

Cite this paper

Mariappan, L. and Rubasoundar, K. 2016 Isolating Wormhole Attack in Wireless Sensor Networks. Circuits and Systems, 7, 2036-2046. doi: 10.4236-cs.2016.78177.

Autor: L. Thanga Mariappan*, K. Rubasoundar



Documentos relacionados