Study of Wormhole Attack in Wireless Sensor Networks

Download Now
Provided by: RS Publication
Topic: Networking
Format: PDF
In this paper, the authors identify the malicious wormhole attacker nodes that are present in wireless sensor networks. It will also redefine the routing by choosing alternate path. This paper is to study various ways to apply worm-hole attack and derive a need to detect and prevent WSNs from worm-hole attack based on Ad-hoc On-demand Distance Vector protocol (AODV).Wireless sensor networks continue to grow and becoming a very popular technology, so it needs some effective security mechanisms. In sensor networks, sensor nodes interact with the sensitive data and operate in hostile environments.
Download Now

Find By Topic