This document reviews network layer attacks and countermeasures in wireless sensor networks (WSNs). It discusses six major network layer attacks: wormhole attacks, flooding attacks, selective forwarding attacks, sinkhole attacks, Sybil attacks, and replay attacks. For each attack, it examines existing countermeasure solutions proposed in previous research. It also identifies some open research challenges in providing comprehensive security solutions for WSNs given their resource constraints and dependence on energy efficiency.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
Â
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
Â
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETijsptm
Â
Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on
MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing
paths on MANET. In this paper, MLDW- a multilayered Intrusion Detection Prevention System approach is
proposed to detect and isolate wormhole attack on MANET. The routing protocol used is Adhoc On Demand
Distance Vector (AODV). MLDW has a layered framework consisting of link latency estimator, intermediate
neighbor node discovery mechanism, packet drop calculator, node energy degrade estimator followed by
isolation technique. MLDW effectiveness is evaluated using ns2 network simulator.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
Â
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
Â
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETijsptm
Â
Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on
MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing
paths on MANET. In this paper, MLDW- a multilayered Intrusion Detection Prevention System approach is
proposed to detect and isolate wormhole attack on MANET. The routing protocol used is Adhoc On Demand
Distance Vector (AODV). MLDW has a layered framework consisting of link latency estimator, intermediate
neighbor node discovery mechanism, packet drop calculator, node energy degrade estimator followed by
isolation technique. MLDW effectiveness is evaluated using ns2 network simulator.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Â
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Â
Abstract: In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using
wireless link where each node may behave like both as a host and router. MANET encounters number of
security threats because of its open entrusted environment, with little security arrangement, security over
MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of
the prominent security threats wormhole attack is considered to be a very serious security threat over MANET.
In wormhole two selfish node which is geographically very far away to each other makes tunnel between each
other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to
make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and
its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the
brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to
detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count
method.
Keywords: Mobile Ad hoc Network, Selfish node, Malicious node, AODV
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Â
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
Â
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Â
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Â
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Â
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Â
Abstract: In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using
wireless link where each node may behave like both as a host and router. MANET encounters number of
security threats because of its open entrusted environment, with little security arrangement, security over
MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of
the prominent security threats wormhole attack is considered to be a very serious security threat over MANET.
In wormhole two selfish node which is geographically very far away to each other makes tunnel between each
other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to
make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and
its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the
brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to
detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count
method.
Keywords: Mobile Ad hoc Network, Selfish node, Malicious node, AODV
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Â
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
Â
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Â
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Â
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Â
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and comparatively analyze them basing on; their ability to detect the attack under different attack strategies (partial and or cooperate attacks), environments and the computational and communication overheads caused in the process of detection.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Â
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This
has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack
of centralized management of these networks makes them vulnerable to a number of security attacks. One
of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several
techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in
this paper we review some of the packet drop attack detection techniques and comparatively analyze them
basing on; their ability to detect the attack under different attack strategies (partial and or cooperate
attacks), environments and the computational and communication overheads caused in the process of
detection.
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
Â
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial. Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network. So, preventing these intrusions by detecting them has become one of the most demanding challenges. This paper, proposes an
improved watchdog technique as an effective technique for detecting malicious nodes based on a power aware hierarchical model. This technique overcomes the common problems in the original Watchdog mechanism. The main purpose to present this model is reducing the power consumption as a key factor
for increasing the network's lifetime. For this reason, we simulated our model with Tiny-OS simulator and then, compared our results with non hierarchical model to ensure the improvement. The results indicate that, our proposed model is better in performance than the original models and it has increased the lifetime of the wireless sensor nodes by around 2611.492 seconds for a network with 100 sensors.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
Â
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
Â
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
Survey of wormhole attack in wireless sensor networksCSITiaesprime
Â
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
International Journal of Engineering Research and DevelopmentIJERD Editor
Â
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
Â
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Â
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
Â
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Â
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Â
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Â
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are various security issues and problems. Two most important issues are interoperability and interaction among various security technologies which are very important to consider for configuration and management point of view. The packet drop ratio in the wireless network is very high as well as packets may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks. Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the performance of WLAN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
Â
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
Â
ith the recent advancements in and popularity of wireless ne
tworks, the security based issues are also
increasing considerably. In this paper, we look at the data s
ecurity and situational security vulnerabilities
in the communication network for fishermen at sea being develope
d by our research center. We are
proposing certain solutions and algorithms for avoiding some of the si
tuations. They are Adaptive Context-
aware Transmission Power Control (ACTPC) as a proposed solution
for preventing unauthorized users at
the maritime border, along with border alert and distress alert. Th
e algorithms are implemented using a
network of MICAz mote
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Â
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
Â
One of the main challenges in MANET is to design the robust security solution that can protect MANET
from various routing attacks. Flooding attack launched at network layer is a serious routing attack which
can consume more resources like bandwidth, battery power, etc. It is more concealed form of Denial of
service attack and resource consumption attack. The route discovery scheme in reactive routing protocols
like Adhoc On Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) used in MANET
makes it more easy for malicious nodes to launch connection request floods by flooding the route request
packets (RREQ) on the network. A novel detection technique based on dynamic profile with traffic pattern
analysis (PDS) is proposed. Its effectiveness in detecting and isolating the malicious node that floods the
route request packets is evaluated using java simulator jist/swans.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
Â
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Â
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Â
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Â
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
Â
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
Â
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Â
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Â
C010631015
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015), PP 10-15
www.iosrjournals.org
DOI: 10.9790/2834-10631015 www.iosrjournals.org 10 | Page
A Review of Network Layer Attacks and Countermeasures in
WSN
S.Nithya1
, K.VijayaLakshmi2
, V.PadmaPriya3
123
Department of Electrical and Electronics Engineering SRM University, Ramapuram – Chennai, India
Abstract: Wireless Sensor Network is a wireless network of thousands of inexpensive miniature devices
capable of computation, communication and sensing. It provides a bridge between real physical and virtual
worlds. In spite of its wide range of potential application to industry, science, transportation and security; it
poses security threats at different layers. In this paper different types of attacks in network layer are examined
and existing solutions were discussed. Some open research issues are also presented.
Keywords: Network Layer; Security; Wireless Sensor Network.
I. Introduction
Wireless Sensor Network are spatially distributed autonomous sensor to monitor physical or
environmental conditions[1] such as temperature, sound, pressure etc. and to cooperatively pass their data
through the network to a main location.
Fig.1.Wireless Sensor Network Architecture
The WSN is built of “nodes” – from a few to several hundreds or even thousands, where each node is
connected to one (or sometimes several) sensors.
Each such sensor nodes has several parts: a radio transceiver with internal antenna or connection to external
antenna, a microcontroller, an electronic circuit for interfacing with sensors and energy source usually a battery.
The Network Layer has lot of challenges depending on applications, but the major challenges
are in power saving, limited memory and buffers. Sensors does not have global ID and have to be self
organized. Many security threats in Network Layer have been presented in the literature. In this paper we
discuss six important attacks in Network Layer.
The organization of this article is as follows. Section II presents the various security aspect of WSN,
section III explains WSN protocol stack, section IV examines different attacks in Network Layer and the
existing solutions, section V put forward open challenges in research and final section VI provides conclusion of
this paper.
II. Security Aspect Of Wsn
To make a wireless network secure, the network should support all secure parameters like
confidentiality, authenticity, availability and integrity.
Confidentiality: - In sensor Network, confidentiality relates to the following [2], [3]
ď‚· A sensor network should not leak sensor readings to its neighbors. The data stored in sensor node must
be highly sensitive.
2. A Review of Network Layer Attacks and Countermeasures in WSN
DOI: 10.9790/2834-10631015 www.iosrjournals.org 11 | Page
ď‚· Since the nodes communicate highly sensitive data, secure channel is important in a WSN system.
ď‚· The network must encrypt data to protect against traffic analysis attacks.
Integrity: - It ensures that message sent from one node to another is not modified by malicious intermediate
nodes. In WSN intrusion detection system can provide integrity mechanism.
Availability: - Attacks damage the availability for WSN for the following reasons
ď‚· Additional computation consumes additional energy. If no more energy exists, data will no larger be
available.
ď‚· A single point failure greatly threatens availability of network if central point scheme is used.
Authenticity: - It ensures that the other end of connection or originator of a packet is the node that is claimed.
Access control prevents unauthorized access to a resource.
III. Protocol Stack
A simplified protocol stack for WSN is summarized in figure 2
Fig. 2. Protocol Stack
ď‚· Application Layer:
It defines a standard set of services and interface primitives available independently for the
programmer on their implementation on every kind of platform.
ď‚· Transport Layer :
It helps to maintain the flow of data, if sensor network application requires it.
ď‚· Network Layer :
It takes care of routing the data, directing the process of selecting paths along which to send the data in
the network.
ď‚· Data Link Layer:
It provides multiplexing of data streams, data frame detection and MAC.
ď‚· Physical Layer:
It is responsible for frequency and power selection, modulation and data encryption.
IV. Attacks In Network Layer
The Network Layer vulnerabilities generally fall into one of the two categories: routing attack and
packet forwarding attack based on target operation of attacks. The following describes the Network Layer
attacks in WSN.
A. Wormhole Attack
In this attack, a pair of colluding attackers record packet at one location and replay them at another
location using private high speed network. The seriousness of this attack is that it can be launched against all
communications that provide authenticity and confidentiality. Figure (3) shows an example of wormhole attack.
3. A Review of Network Layer Attacks and Countermeasures in WSN
DOI: 10.9790/2834-10631015 www.iosrjournals.org 12 | Page
Fig. 3. Wormhole Attack
In [4] packet leashes are proposed to detect and defend against wormhole attack. In [5] the author offers
protection against wormhole in OLSR protocol. This approach is based on the location information and requires
deployment of public key infrastructure and time stamp synchronization between all the nodes. In [6] the author
proposes statistical analysis of multipath which is an approach to detect wormhole attack by using multipath
routing..This approach determines the attack by calculating relative frequency of each link in all the routes. The
link with highest frequency is identified as wormhole link. The advantage is, it employs limited overhead in
multipath routing. But it doesn’t work in non –multipath routing protocol like AODV protocol. In [7] the author
adopts directional antennas and find infeasible communicating links by utilizing directionality of antenna
communication. In [8] author presents a graph based framework to tackle wormholes. This approach assumes
existence of guard nodes with extra ordinary communication range. In [9] the author graphically visualizes
presence of wormholes. They reconstruct layout of network by centralized multidimensional scaling (MDS) to
capture wrap introduced by the wormholes. In [10] the author analyzes impact of combination of wormholes by
topology methodology. They locate various wormholes by detecting non separating loops, without any special
hardware devices or any assumption on the network properties. In [11] the author explains wormhole attack
modes and classes and described attack from attacker’s perspective.
B. Flooding Attack
In flooding attack, attacker exhausts network resources such as bandwidth and consume node’s
resources such as computational and battery power to disrupt routing operation to cause severe degradation in
network performance.
Fig. 4. Flooding Attack
In [12] the author proposes simple mechanism to prevent flooding in AODV protocol. In this approach,
each node monitors and calculates rate or neighbor’s RREQ. If RREQ rate of any neighbor exceeds predefined
threshold, node record ID of this neighbor in the black list and drop any future RREQs from the node. The
limitation is, it cannot prevent attack if flooding rate is below threshold. In [13] the author proposed technique
based on the statistical analysis to detect malicious RREQ floods. This approach determines threshold based on
statistical analysis of RREQs, which can be applied for varying flooding rates.
4. A Review of Network Layer Attacks and Countermeasures in WSN
DOI: 10.9790/2834-10631015 www.iosrjournals.org 13 | Page
C. Selective Forwarding / Black Hole
In this attack malicious node behave like normal node and forward packets but selectively drop some
packets. When the malicious node acts like a black hole, it drops all the packet passing through it [14]. Selective
Forwarding attack is called as special case of Black Hole attack.
Fig. 5. Black hole Attack
The countermeasures for selective forwarding attack can be classified as follows [15].
ď‚· Acknowledgement based detection.
ď‚· Detection using neighborhood information.
ď‚· Using multidata flow to mitigate attack.
In [16] author describes lightweight detection scheme which uses only two – hop neighborhood
information. Each node sends a HELLO packet which contains three important fields source node ID,
intermediate node ID and hop counter value. In [17] the author discusses some of the mitigation schemes to
defend this attack and also discussed drawback of each scheme. In [18] author analyses four scenarios based on
implicit acknowledgement in energy harvesting WSN and proposed hop-by-hop co-operative detection (HCD)
to effectively detect the forwarding misbehaviors of malicious node and to mitigate it.
D. Sink Hole
In this, a compromised node is made to look exclusively attractive to its neighbor nodes regarding the
routing algorithm and pull almost all the traffic from specific area [19]. The attacker listens route requests of
nodes and tries to persuade that it has shortest path for base station [20].
Fig. 6. Sink Hole Attack
In this the author proposed detection scheme based on link quality indicator in sensor network. This
method can detect sink hole attack that uses LQI base routing and several detecting nodes. Detecting mechanism
is also described in Adhoc networks like AODV [22] and DSR protocol [23]. In [24] author detects malicious
node using hop counting. The advantage of this technique is malicious node can be detected without any
negotiation with the base station.
E. Sybil Attack
In this attack, single node presents multiple identities to all the other nodes in WSN. This may mislead
other nodes and hence route believed to be disjoint with respect to the node can have the same adversary node.
5. A Review of Network Layer Attacks and Countermeasures in WSN
DOI: 10.9790/2834-10631015 www.iosrjournals.org 14 | Page
Fig. 6. Sybil Attack
In [25] the author analyses different defenses for Sybil attacks like position verification, registration,
key predistribution and code attestation and radio resource testing. In this random key predistribution is most
promising methods as it relies on cryptographic principles and robust to compromised nodes. In [26] the author
presents a novel decentralized protocol for limiting the corruptive influences of Sybil attacks by bounding both
number and size of Sybil groups.
F. Replay Attack
It is a form of network attack, in which a valid data transmission is maliciously or fraudently repeated
or delayed. It is carried out either by the originator or by an adversary who intercepts the data and retransmits it.
Fig. 7. Replay Attack
There are several countermeasures like session tokens, one Time Password (OTP), Time stamping etc.
In [27] the author designs a light weight detection and prevention system cops that intelligently uses
combination of digital signatures and Bloom filters to cope with attack.
V. Open Research Issues
Sensor networks are still at an early stage in terms of technique as it is still not widely deployed in
world and these provide doors for many research issues. [28], [29], [30]
ď‚· Energy efficiency is an important criterion. It is necessary to find the energy efficient routes to improve
the life time of network.
ď‚· Data collected by various sensors in WSN are typically based on common phenomena. Hence there is a
high probability, that this data has some redundancy.
ď‚· Multipath design technique must be incorporated. So that a path among them can be used, when the
primary path fails.
ď‚· Sensor network collect information from physical environment and are highly data centric. To
maximize energy saving a flexible platform for performing routing and data management must be
provided.
ď‚· Messages exchanged in WSN are vulnerable to security attacks. During transmission, messages can be
tampered or eavesdrop. Research is needed to ensure the confidentiality of messages.
6. A Review of Network Layer Attacks and Countermeasures in WSN
DOI: 10.9790/2834-10631015 www.iosrjournals.org 15 | Page
VI. Conclusion
WSN are having extraordinary growth nowadays because of its application in various fields. The
application using WSN, expects guarantee in security in all aspects. In this paper various attacks in Network
layer were discussed and different existing countermeasures to overcome these attacks were reviewed. But the
recently offered security mechanism are relayed on particular network structure, hence it is less efficient to
provide complete solution for security in WSN. This paper has suggested some open research challenges in this
regard.
References
[1]. “Environmental and Temperature Monitoring”, Centrak.
[2]. F.Akyildilz, W. Su. Y. Sankrasubramaniyam and E. Cayirci, “A Survey on Sensor Networks”, IEEE Communication Magazine,
40(8): 102 – 114, August 2002.
[3]. Erdal Cayirci and Chenming Rong, “Security in Wireless Adhoc and Sensor Networks”, A John Wiley and Sons Ltd, Publication,
2009.
[4]. Y.Hu, A.Perig and D. Johnson, “Wormhole Attack in Wireless Networks”, IEEE JSAC, Vol 24,no. 2, Feb. 2006.
[5]. D.Raffo et al, “Securing OLSR Using Node Locations”, proc. 2005. Euro, Wireless, Nicosia, Cyprus, Apr. 10-13, 2005.
[6]. L. Qian, N. Song and X. Li, “Detecting and Locating Wormhole Attack in Wireless Adhoc Network Through Statistical Analysis
of Muitipath”,IEEE, Wireless Communication and Networking Conference.’05.
[7]. L.Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks”, presented at NOSS, 2004
[8]. R. Poovendhan and L. Lazos, “A Graph Theoritic Framework for Preventing Wormhole Attack in Wireless Adhoc Networks”,
Wireless Networks.Vol 13, pp. 27-59, 2007.
[9]. W.Wang and B. Bhargava,”Visualization of Wormholes in sensor Networks”,in proc. ACM wise, 2004, pp. 51-60.
[10]. Dezun Dong, Mo Li, Yanhao Li and Xiang – Yang, “Topological Detection on Wormholes in Wireless AdHoc and Sensor
Networks”, IEEE transactions on Networking, Vol 19, No 6, pp. 1787-1795. Dec. 2011
[11]. Azer,Sherif,Magdy, “A Full Image of Wormhole Attacks Towards Introducing Complex Wormhole Attacks in Wireless Adhoc
Networks”, IJCSIS, Vol 1, No 1, pp. 41-51, May 2009.
[12]. P. Yi et al, “A New Routing Attack in Mobile Ad Hoc Networks”, int. J. Infotech, Vol. 11, no 2, 2005.
[13]. S.Desilva and R.V.Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks”, proc. IEEE Wireless
Communication and Networking Conference, New Orleans, LA, 2005.
[14]. Chris Karlof and David Wagnet, “Secure Routing in WSN: Attacks and Countermeasures Ad Hoc Networks 293-315, 2003.
[15]. L. K. Bysani and A. K. Tureek,”A Survey on Selective Forwarding Attack in WSN”, in Devices and Communications, 2011,
International Conference on IEEE, 2011,pp. 1-5.
[16]. Trian Hoang Hai and Eui Nam Huh, “Detecting Selective Forwarding Attacks in WSN Using TwoHop Neighbor Knowledge”, In
NCA pages 325 –331, 2008.
[17]. Jaspreet Singh,Anuj Gupta, “Different Approaches to Mitigate Selective Forwarding Attacks in WSN”, IJIET, Vol 3, pp. 40-46,
2014.
[18]. Sunho Lim and Lauren Huie,”Hop-by-Hop Co-operative Detection of Selective ForwardingAttacks in Energy Harvesting WSN”’
ICNC,Workshop on CNC, on IEEE, 2015, pp. 315-319.
[19]. Hemanta Kumarand Avijit Kar,”Wireless Sensor Network Security Analysis”, international Journal of Next Generation Networks
(IJNGN),Vol. 1, No. 1, Dec. 2009.
[20]. E. C. Nagai, J. Liu and M. R. Lyer, ”An EfficientIntruder Detection Algorithm against Sink Hole Attacks in WSN”, Computer
Communications, Vol. 30, no. 11, pp. 2353-2364, 2007.
[21]. B. G. Choi, E. J. Cho, J. Hokim, C. S. Hong and J. H. Kim, “A Sink Hole Attack Detection Mechanism for LQI Based Mesh
Routing in WSN”, ICOIN 2009,pp. 1-5.
[22]. D.Dallas,C. Leckie and K.Ramamohanrao, ”Hop Count Monitoring: Detecting Sink Hole Attack in WSN”, ICON 07: Proceedings
of 15th
IEEE International Conference. 2007, pp. 176-181.
[23]. A. A. Pilzada and C. M. C. Donald, “Circumventing Sinkhole Attacks in WSN Using Hop Count”, I.J.Computer Network and
Information Security, 2015,pp. 50-56.
[24]. Md.Ibrahim, Md.Muntasir, “Detecting Sink HoleAttacks in WSN using Hop Count”, I.J. ComputerNetworks and Information
Security, 2015,pp. 50-56.
[25]. James Newsome,Elaine Shi,Dawn Song,and Adrian Purig,”The Sybil Attack in Sensor Networks:
[26]. Analysis and Defenses”, April 26-27, 2004,Berkely,California, USA.
[27]. Haifeng Yu, Michael, Philip and Abraham, “Sybil Guard: Defending Against Sybil Attacks in SocialNetworks”, SIGCOMM ’06,
Sep. 11-15.
[28]. Navnet, Rakesh, “Sybil Attack Detection and Prevention Using AODV in VANET”, IJCSM, Vol 13, Sep. 2013.
[29]. Limin Wang, “Survey on Sensor Networks”, Department of Computer Science Engineering,Michigan State University, 2004.
[30]. Deepak Ganesan et al, “Networking issues in Wireless Sensor Networks”, Elseiver Science, 9th
December 2006.
[31]. P.Jiang, yu Wen et.al, “A Study of Routing Protocol in Wireless Sensor Networks”, in Proceedings of 6th
World Congress on
intelligent Control and Automation, June 21-23, 2006, Dalian, China.