Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks
Abstract
Keywords
Full Text:
PDFReferences
Bankovic, Z., Fraga, D., Moya, J., & Vallejo, J. C. (2012). Detecting unknown attacks in wireless sensor networks that contain mobile nodes. Sensors, 12(8).
He, R., Ma, G., Wang, C., & Fang, L. (2009). Detecting and locating wormhole attacks in wireless sensor networks using beacon nodes. World Academy of Science, Engineering and Technology, 55.
Honglong, C., Wei, L., Xice, S., & Zhi, W. (2010). A secure localization approach against wormhole attacks using distance consistency. EURASIP Journal on Wireless Communications and Networking, 2010, 1-11.
Hu, Y., Perring, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. Proceedings of 22nd Annual Conference of the IEEE Computer and Communication Societies, 3, pp. 1976-1986.
Jagadeesan, S. (2016). Wireless sensor network security. Proceedings of 3rd International Conference on Recent Innovations in Science, Technology, Management and Environment, 16, pp. 202-209.
Jha, M. K., & Sharma, T. P. (2010). A new approach to secure data aggregation protocol for wireless sensor network. International Journal on Computer Science & Engineering, 1(5), 1539-1543.
Kumar, K., Waheed, M., & Basappa, K. (2010, October). TCPL: A defense against wormhole attacks in wireless sensor networks. Paper presented at AIP Conference Proceedings, Ipswich, United Kingdom.
Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L. W. (2005). Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach. Proceedings of Wireless Communications and Networking Conference, 2005 IEEE, pp. 1193-1199.
Mahadevi, G. (2011). Location discovery with security in wireless sensor networks. International Journal on Computer Science & Engineering, 3(4), 1528-1533.
Meghdadi, M., Ozdemir, S., & Guler, I. (2011). A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. IETE Technical Review, 28(2), 89-102.
Qiu, Y., Zhou, J., Baek, J., & Lopez, J. (2010). Authentication and key establishment in dynamic wireless sensor networks. Sensors, 10(4), 3718-3731.
Rahman, M., & El-Khatib, K. (2009). Secure anonymous communication for wireless sensor networks based on pairing over elliptic curves. Journal of Interconnection Networks, 10(4), 459-479.
Rani, A. & Kumar, S. (2017). A survey of security in wireless sensor networks. Proceedings of 3rd International Conference on Computational Intelligence & Communication Technology, 8, 256-260.
Shabana, K., Fida, N., Khan, F., Jan, S.R., & Rehman, M. (2016). Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering, 5(7), 81-87.
Shang-Ming, J., Chi-Sung, L., & Wen-Chung, K. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. Sensors, 9(6), 5022-5039.
Sharma, P., & Bhadana, P. (2010). An effective approach for providing anonymity in wireless sensor network: Detecting attacks and security measures. International Journal on Computer Science & Engineering, 1(5), 1830-1835.
Tun, Z., & Maw, A. H. (2008). Wormhole attack detection in wireless sensor networks. Proceedings of World Academy of Science Engineering and Technology, 46, pp. 545-550.
Wang, W., & Bhargava, B. (2004). Visualization of wormholes in sensor networks. In Proceedings of the 2004 ACM Workshop on Wireless Security (pp. 51-60). Philadelphia, PA: ACM WiSE'04.
Refbacks
- There are currently no refbacks.
Copyright© 2015 Journal of Research in Business, Economics and Management. All rights reserved.
ISSN 2395-2210
For any help/support contact us at editorial@scitecresearch.com, jrbem@scitecresearch.com.