Wormhole Attack: a Major Security Concern in Internet of Things (Iot)

  • Authors

    • Swetha Palacharla
    • M Chandan
    • K GnanaSuryaTeja
    • G Varshitha
    2018-08-15
    https://doi.org/10.14419/ijet.v7i3.27.17748
  • Wormhole attack, Wsn – wireless network, WSN CAPS
  • The Internet of Things (IoT) is nothing but a collection of wireless and wired devices, commonly termed as nodes operated remotely. This operation is done by assuming these nodes as the sensors in a wireless sensor network (WSN) administered through a base station. We start with briefing about IoT and then briefing IoT layer models. After this, we discuss attacks with regard to IoT namely Sinkhole attack, Sybil attack, HELLO flood attack, Acknowledgement spoofing attack and their respective detection methods. This paper is systematic review of existing mechanism for the detection of wormhole attack and a new method is proposed.

     

     

  • References

    1. [1] Network Security Issues in the Internet of Things (IoT)

      Stuart Millar, PhD Cyber Security Student, 13616005, Queen’s Uni

      versity of Belfast

      [2] Detection of Sinkhole Attack in Wireless Sensor Network by Ahmad

      Salehi S., M.A. Razzaque, Parisa Naraei, Ali Farrokhtala, Faculty of

      Computing, Universiti Technologi of Malaysia (UTM), Skudai, Malsia

      [3] Detection and Prevention of Wormhole Attack in Wireless Sensor

      Network using AOMDV protocol by Parmar Amisha ,V.B.Vaghelab,

      Student, Sankalchand Patel College of Engineering, Visnagar-384315,

      India

      [4] Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Wormhole At

      tacks in Wireless Networksâ€, IEEE journal on selected areas in com

      munications, Vol.24, No.2, pp. 370-380,February 2006.

      [5] Hello Flood Attack and its Countermeasures in Wireless Sensor Net

      works by Virendra Pal Singh1, Sweta Jain2 and Jyoti Singhai, Depart

      ment of Computer Science and Engineering, MANIT, Bhopal,

      M.P.,India

      [6] Security issues in wireless sensor network data gathering protocols:A

      survey by Prabhudutta mohanty,Sangram panigrahi, Nityananda sarma

      and Siddhartha sankar satapathy Department of Computer Science and

      Engineering,Tezpur University, Tezpur, India

      [7] Detecting and Preventing Sybil Attacks in Wireless Sensor Networks

      Using Message Authentication and Passing Method by Udaya Suriya

      Raj Kumar Dhamodharan1 and Rajamani Vayanaperumal, Department

      of Computer Science and Engineering, Sathyabama University, Chen

      nai, Tamil Nadu 600 119, India

      [8] G, Abikhanova, A Ahmetbekova, E Bayat, A Donbaeva, G Burkitbay (2018). International motifs and plots in the Kazakh epics in China (on the materials of the Kazakh epics in China), Opción, Año 33, No. 85. 20-43.

      [9]G, Abikhanova, A Ahmetbekova, E Bayat, A Donbaeva, G Burkitbay (2018). International motifs and plots in the Kazakh epics in China (on the materials of the Kazakh epics in China), Opción, Año 33, No. 85. 20-43.

      [10]Akhpanov, S. Sabitov, R. Shaykhadenov (2018). Criminal pre-trial proceedings in the Republic of Kazakhstan: Trend of the institutional transformations. Opción, Año 33. 107-125.

  • Downloads

  • How to Cite

    Palacharla, S., Chandan, M., GnanaSuryaTeja, K., & Varshitha, G. (2018). Wormhole Attack: a Major Security Concern in Internet of Things (Iot). International Journal of Engineering & Technology, 7(3.27), 147-150. https://doi.org/10.14419/ijet.v7i3.27.17748