International Journal for Development of Computer Science & Technology (IJDCST)
Multi-hop routing in wireless sensor networks offers little protection against deception through replaying routing information. A resister will exploit this defect to launch numerous harmful or even devastating attacks against the routing protocols, together with wormhole attacks, sinkhole attacks, and Sybil attacks. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. This defect can be taken advantage of by an adversary to misdirect significant network traffic, resulting in disastrous consequences. To secure multi-hop routing in WSNs against intruders exploiting the replay of routing information.