Wormhole Attack: a Major Security Concern in Internet of Things (Iot)
-
2018-08-15 https://doi.org/10.14419/ijet.v7i3.27.17748 -
Wormhole attack, Wsn – wireless network, WSN CAPS -
Abstract
The Internet of Things (IoT) is nothing but a collection of wireless and wired devices, commonly termed as nodes operated remotely. This operation is done by assuming these nodes as the sensors in a wireless sensor network (WSN) administered through a base station. We start with briefing about IoT and then briefing IoT layer models. After this, we discuss attacks with regard to IoT namely Sinkhole attack, Sybil attack, HELLO flood attack, Acknowledgement spoofing attack and their respective detection methods. This paper is systematic review of existing mechanism for the detection of wormhole attack and a new method is proposed.
Â
Â
-
References
[1] Network Security Issues in the Internet of Things (IoT)
Stuart Millar, PhD Cyber Security Student, 13616005, Queen’s Uni
versity of Belfast
[2] Detection of Sinkhole Attack in Wireless Sensor Network by Ahmad
Salehi S., M.A. Razzaque, Parisa Naraei, Ali Farrokhtala, Faculty of
Computing, Universiti Technologi of Malaysia (UTM), Skudai, Malsia
[3] Detection and Prevention of Wormhole Attack in Wireless Sensor
Network using AOMDV protocol by Parmar Amisha ,V.B.Vaghelab,
Student, Sankalchand Patel College of Engineering, Visnagar-384315,
India
[4] Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Wormhole At
tacks in Wireless Networksâ€, IEEE journal on selected areas in com
munications, Vol.24, No.2, pp. 370-380,February 2006.
[5] Hello Flood Attack and its Countermeasures in Wireless Sensor Net
works by Virendra Pal Singh1, Sweta Jain2 and Jyoti Singhai, Depart
ment of Computer Science and Engineering, MANIT, Bhopal,
M.P.,India
[6] Security issues in wireless sensor network data gathering protocols:A
survey by Prabhudutta mohanty,Sangram panigrahi, Nityananda sarma
and Siddhartha sankar satapathy Department of Computer Science and
Engineering,Tezpur University, Tezpur, India
[7] Detecting and Preventing Sybil Attacks in Wireless Sensor Networks
Using Message Authentication and Passing Method by Udaya Suriya
Raj Kumar Dhamodharan1 and Rajamani Vayanaperumal, Department
of Computer Science and Engineering, Sathyabama University, Chen
nai, Tamil Nadu 600 119, India
[8] G, Abikhanova, A Ahmetbekova, E Bayat, A Donbaeva, G Burkitbay (2018). International motifs and plots in the Kazakh epics in China (on the materials of the Kazakh epics in China), Opción, Año 33, No. 85. 20-43.
[9]G, Abikhanova, A Ahmetbekova, E Bayat, A Donbaeva, G Burkitbay (2018). International motifs and plots in the Kazakh epics in China (on the materials of the Kazakh epics in China), Opción, Año 33, No. 85. 20-43.
[10]Akhpanov, S. Sabitov, R. Shaykhadenov (2018). Criminal pre-trial proceedings in the Republic of Kazakhstan: Trend of the institutional transformations. Opción, Año 33. 107-125.
-
Downloads
-
How to Cite
Palacharla, S., Chandan, M., GnanaSuryaTeja, K., & Varshitha, G. (2018). Wormhole Attack: a Major Security Concern in Internet of Things (Iot). International Journal of Engineering & Technology, 7(3.27), 147-150. https://doi.org/10.14419/ijet.v7i3.27.17748Received date: 2018-08-17
Accepted date: 2018-08-17
Published date: 2018-08-15