ANALYTICAL STUDY ON SECURITY AND ATTACKS CONCERNING WORMHOLE DETECTION IN STATIC WIRELESS SENSOR NETWORKS

Main Article Content

Jagathese G Chelladurai,Dr. Mona Dwivedi

Abstract

Sensor nodes, when organized to build a WSN working below the switch of a central specialist, Improper position, are skilled of displaying fascinating applications due to their potential to be distributed widely in hostile and pervasive contexts. However, for the same reason, security is now a top concern for these networks. WSNs are susceptible to a variety of internal and external attacks due to their lack of tamper-proof packaging, limited processing power, memory capacity, and battery life. Because of their widespread use, WSNs are particularly susceptible to a variety of security risks. A denial-of-service attack is the most frequent and dangerous enemy to WSNs (DOS). Wormhole assault is another one of the several attack strategies. In order to achieve optimal network performance, a static clustering approach is suggested in this research. To assist in determining the initial energy allocation of these cluster heads and nodes, an energy model of this technique is offered. Finally, a simulation is shown to demonstrate how energy allocation is made to significantly lengthen network lifespan.

Article Details

How to Cite
Jagathese G Chelladurai,Dr. Mona Dwivedi. (2025). ANALYTICAL STUDY ON SECURITY AND ATTACKS CONCERNING WORMHOLE DETECTION IN STATIC WIRELESS SENSOR NETWORKS. International Journal of Advanced Research and Multidisciplinary Trends (IJARMT), 2(2), 472–485. Retrieved from https://ijarmt.com/index.php/j/article/view/238
Section
Articles

References

C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” in Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.pp.293-301

He, R., Ma, G., Wang, C., & Fang, L. (2009). Detecting and locating wormhole attacks in wireless sensor networks using beacon nodes. World Academy of Science, Engineering and Technology.

He Ronghui, Ma Guoqing, Wang Chunlei, and Fang Lan “Detecting and Locating Wormhole attacks in wireless sensor networks using Beacon Nodes” International Journal of Computer and Information Engineering Vol:3, No:7, 2009

Rama Krishna Challa , Mani Arora, Divya Bansal, “Performance Evaluation of Routing Protocols Based on Wormhole Attack in Wireless Mesh Networks”, IEEE Second International Conference on Computer and Network Technology, pp 102-104, 2010.

Preeti Nagrath, Bhawna Gupta, “Wormhole Attacks in Wireless Adhoc Networks and their Counter Measurements: A survey”, pp 245-250, IEEE 2011

Majid Meghdadi, Suat Ozdemir and Inan Guler, “A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks”, IETE TECHNICAL REVIEW, VOL 28, ISSUE 2, Mar-Apr 2011.

Priya Maidamwar and Nekita Chavhan “A Survey on Security Issues to Detect Wormhole Attack in wireless sensor network, International Journal on AdHoc Networking Systems (IJANS)Vol. 2, No. 4, October 2012.

Abhishek Jain, Kamal Kant, “Security Solutions for Wireless Sensor Networks”, IEEE Second International Conference on Advanced Computing & Communication Technologies, pp 430433,2012.

M. Bendjima and M. Feham, "Wormhole attack detection in wireless sensor networks," 2016 SAI Computing Conference (SAI), London, 2016, pp. 1319-1326.

S. Bhagat and T. Panse, "A detection and prevention of wormhole attack in homogeneous Wireless Sensor Network," 2016 International Conference on ICT in Business Industry & Government (ICTBIG), Indore, 2016, pp. 1-6

P. Khandare, Y. Sharma and S. R. Sakhare, "Countermeasures for selective forwarding and wormhole attack in WSN," 2017 International Conference on Inventive Systems and Control (ICISC),

Coimbatore, 2017, pp. 1-7

Z. Liu, X. Deng and J. Li, "A secure localization algorithm based on reputation against wormhole attack in UWSNS," 2017 International Symposium on Intelligent Signal Processing and Communication Systems (PACS), Xiamen, 2017, pp. 695-700.

Pradeep Chouksey, "Study of Routing in Ad hoc network", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.2, pp.55-57, 2017.

M. Arora, S. Sharma, "Synthesis of Cryptography and Security Attacks", International Journalof Scientific Research in Network Security and Communication, Vol.5, Issue.5, pp.1-5, 2017.

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.