The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastat...

متن کامل

Wormhole Attack Detection in Wireless Sensor Networks

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending me...

متن کامل

The Efficient Prevention of Wormhole Attack in AODV Routing Protocol in Wireless Sensor Networks

Wireless sensors networks (WSNs) consist of a large number of tiny, spatially distributed, and autonomous devices, called sensor nodes. The latter are equipped with sensing, computation, and wireless communications capabilities, and have very limited resources. Wireless sensor networks have been widely used in remote areas, military scenarios, sensing motion applications, agriculture solutions ...

متن کامل

A Wireless Sensor Networks Test-bed for the Wormhole Attack

In some applications, wireless sensor devices must be secured, especially when the captured information is valuable and sensitive. The wormhole attack is a significant type of security attack that can damage wireless sensor networks if they go undetected. It occurs when the attacker records packets at one point of the network, and then passes them into a different node. This node then injects t...

متن کامل

An efficient wormhole attack detection method in wireless sensor networks

Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially des...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Processing Systems

سال: 2010

ISSN: 1976-913X

DOI: 10.3745/jips.2010.6.2.177