Packet Flow Rate to Protect Wireless Sensor Networks from Wormhole and Hello Flood Attacks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Wormhole Attacks in Wireless Sensor Networks

Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which ...

متن کامل

Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks

As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wo...

متن کامل

Wormhole Attacks and Countermeasures in Wireless Sensor Networks : A Survey

Wireless sensor networks can be deployed in inhospitable terrains or in hostile environments to provide continuous monitoring and processing capabilities. Due to the wireless and distributed nature, security is very crucial issue in wireless sensor network. Security comes from attacks. Detecting wormhole attack is very hard compared to other attacks because it uses private, out-of-band channel ...

متن کامل

Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks

Due to the rapid development of wireless sensor devices in terms of low power and inexpensive data‐relaying has been partially achieved because of the rapid progress in integrated circuits and radio transceiver designs and device technology. Because of this, the wireless sensor devices are able to gather information, process them if required and send them to the next sensor device. The resource...

متن کامل

Distributed Detection of Wormhole Attacks in Wireless Sensor Networks

Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distribute...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2013

ISSN: 0975-8887

DOI: 10.5120/12462-8821