Wormhole Attack: a Major Security Concern in Internet of Things (Iot)

Authors

  • Swetha Palacharla
  • M Chandan
  • K GnanaSuryaTeja
  • G Varshitha

DOI:

https://doi.org/10.14419/ijet.v7i3.27.17748

Published:

2018-08-15

Keywords:

Wormhole attack, Wsn – wireless network, WSN CAPS

Abstract

The Internet of Things (IoT) is nothing but a collection of wireless and wired devices, commonly termed as nodes operated remotely. This operation is done by assuming these nodes as the sensors in a wireless sensor network (WSN) administered through a base station. We start with briefing about IoT and then briefing IoT layer models. After this, we discuss attacks with regard to IoT namely Sinkhole attack, Sybil attack, HELLO flood attack, Acknowledgement spoofing attack and their respective detection methods. This paper is systematic review of existing mechanism for the detection of wormhole attack and a new method is proposed.

 

 

References

[1] Network Security Issues in the Internet of Things (IoT)

Stuart Millar, PhD Cyber Security Student, 13616005, Queen’s Uni

versity of Belfast

[2] Detection of Sinkhole Attack in Wireless Sensor Network by Ahmad

Salehi S., M.A. Razzaque, Parisa Naraei, Ali Farrokhtala, Faculty of

Computing, Universiti Technologi of Malaysia (UTM), Skudai, Malsia

[3] Detection and Prevention of Wormhole Attack in Wireless Sensor

Network using AOMDV protocol by Parmar Amisha ,V.B.Vaghelab,

Student, Sankalchand Patel College of Engineering, Visnagar-384315,

India

[4] Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Wormhole At

tacks in Wireless Networksâ€, IEEE journal on selected areas in com

munications, Vol.24, No.2, pp. 370-380,February 2006.

[5] Hello Flood Attack and its Countermeasures in Wireless Sensor Net

works by Virendra Pal Singh1, Sweta Jain2 and Jyoti Singhai, Depart

ment of Computer Science and Engineering, MANIT, Bhopal,

M.P.,India

[6] Security issues in wireless sensor network data gathering protocols:A

survey by Prabhudutta mohanty,Sangram panigrahi, Nityananda sarma

and Siddhartha sankar satapathy Department of Computer Science and

Engineering,Tezpur University, Tezpur, India

[7] Detecting and Preventing Sybil Attacks in Wireless Sensor Networks

Using Message Authentication and Passing Method by Udaya Suriya

Raj Kumar Dhamodharan1 and Rajamani Vayanaperumal, Department

of Computer Science and Engineering, Sathyabama University, Chen

nai, Tamil Nadu 600 119, India

[8] G, Abikhanova, A Ahmetbekova, E Bayat, A Donbaeva, G Burkitbay (2018). International motifs and plots in the Kazakh epics in China (on the materials of the Kazakh epics in China), Opción, Año 33, No. 85. 20-43.

[9]G, Abikhanova, A Ahmetbekova, E Bayat, A Donbaeva, G Burkitbay (2018). International motifs and plots in the Kazakh epics in China (on the materials of the Kazakh epics in China), Opción, Año 33, No. 85. 20-43.

[10]Akhpanov, S. Sabitov, R. Shaykhadenov (2018). Criminal pre-trial proceedings in the Republic of Kazakhstan: Trend of the institutional transformations. Opción, Año 33. 107-125.

View Full Article: