Security

Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack

Free registration required

Executive Summary

Wireless Sensor Network provides various applications like military, healthcare etc. These types of applications required a certain level of security. WSN is exposed by various types of attacks; wormhole is one of severe attack on WSN. In wormhole attack, an attacker receives packet from one location pass them through the tunnel and release to them another location. The authors propose an algorithm which defends wormhole attack in WSN called public key encryption and 2Ack based approach. Proposed approach provides security and finds misbehaving nodes in the network.

  • Format: PDF
  • Size: 174.9 KB