TY - JOUR
T1 - A Cluster Based Approach for Detection and Protection of Wormhole Attack in Wireless Sensor Network
AU - Aneja, Darpan
AU - Kumar, Love
AU - Sharma, Vishal
PY - 2019/12/1
Y1 - 2019/12/1
N2 - Wireless Sensor Network (WSN) technology is progressing at a rapid pace and its demand is also increasing massively due to its cost-effective nature and less-challenging installation demands. However, due to its vulnerable wireless environment, WSNs are prone to various types of severely damaging attacks like wormhole, sinkhole, Denial of Service (DoS) etcetera. Therefore, it requires to be more secure and confidential to maintain the productive flow of communication between the nodes. One of the greatest threats which if placed strategically can seriously impair the network is the wormhole attack. In this paper, we proposed a cluster based technique to detect and protect WSN from wormhole attacks. The entire network is divided into clusters eventually at the end and each cluster is governed by a cluster head (CH). Based on Round Trip Time and hop count the security of the network has enhanced and nullified the wormhole attack in the network. A significant improvement in throughput, PDR, Delay has been observed and reported with proposed scheme.
AB - Wireless Sensor Network (WSN) technology is progressing at a rapid pace and its demand is also increasing massively due to its cost-effective nature and less-challenging installation demands. However, due to its vulnerable wireless environment, WSNs are prone to various types of severely damaging attacks like wormhole, sinkhole, Denial of Service (DoS) etcetera. Therefore, it requires to be more secure and confidential to maintain the productive flow of communication between the nodes. One of the greatest threats which if placed strategically can seriously impair the network is the wormhole attack. In this paper, we proposed a cluster based technique to detect and protect WSN from wormhole attacks. The entire network is divided into clusters eventually at the end and each cluster is governed by a cluster head (CH). Based on Round Trip Time and hop count the security of the network has enhanced and nullified the wormhole attack in the network. A significant improvement in throughput, PDR, Delay has been observed and reported with proposed scheme.
UR - https://www.ingentaconnect.com/content/asp/senlet/2019/00000017/00000012/art00007;jsessionid=3o8f84vt0faw.x-ic-live-01
U2 - 10.1166/sl.2019.4184
DO - 10.1166/sl.2019.4184
M3 - Article
VL - 17
SP - 955
EP - 964
JO - Sensor Letters
JF - Sensor Letters
SN - 1546-198X
IS - 12
ER -