Please use this identifier to cite or link to this item:
Title: Security Attacks in Wireless Sensor Networks
Researcher: Patel Manishkumar Manilal
Guide(s): Akshai Aggarwal Nirbhay Chaubey
Keywords: Engineering and Technology,Computer Science,Computer Science Information Systems
Wireless sensor network, Security, Wormhole, Mobility, Detection accuracy, Attacks, Malicious, Tunnel, Vulnerable, Adversary
University: Gujarat Technological University
Completed Date: 12-01-2018
Abstract: quotWireless sensor networks are differing from other ad hoc networks. Sensor nodes are resource newlinelimited devices in terms of energy, bandwidth, storage and computation. It is not desirable to run newlinethe security algorithm which requires more computation and power on sensor nodes. Sensor nodes newlineare generally deployed in hostile or unattended environment. They are prone to failures. Their newlinetopology often changes. They are remotely managed. An adversary can easily capture the nodes. newlineDue to this fundamental characteristics security is very crucial for wireless sensor networks. newlineWireless sensor network is used in military applications, environment monitoring, forest fire newlinedetection, health applications etc. It has received great attention due to the wide range of newlineapplications. newlineSensor nodes are vulnerable to many more attacks such as jamming, selective forwarding, Sybil, newlinewormhole, sinkhole etc. Wormhole is very dangerous among all attacks because after launching newlinewormhole an attacker can launch many more attacks. Research related to wormhole in sensor newlinenetwork has received much interest recently. Launching the wormhole is very easy but detecting it newlineis very hard. To launch the wormhole, an attacker does not need to know the secret material used in newlinethe network. It uses low latency out of band channel that is not visible to other sensor nodes. Two newlinefar away located malicious nodes create a tunnel and disturb the routing process. A malicious node newlineattracts traffic from one area and tunnels to another malicious node located in different area. newlineBy gathering the traffic it is possible to break security mechanism used in the network. Thus, newlinewormhole is a gateway to many more malicious attacks. We have discussed several existing newlinemethods for wormhole detection with merits and demerits. Most of the methods in the literature newlinerequire additional hardware which increases the cost of the sensor node. In mobility based sensor newlinenetworks, two nodes located far away from each other becomes one hop neighbors. It creates an newlineillusion that wormhole has create
Appears in Departments:Computer/IT Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File118.7 kBAdobe PDFView/Open
02_certificate.pdf551.4 kBAdobe PDFView/Open
03_abstract.pdf6.62 kBAdobe PDFView/Open
04_declaration.pdf97.72 kBAdobe PDFView/Open
05_acknowledgement.pdf87.66 kBAdobe PDFView/Open
06_contents.pdf42.76 kBAdobe PDFView/Open
07_list_of_tables.pdf39.67 kBAdobe PDFView/Open
08_list_of_figures.pdf39.95 kBAdobe PDFView/Open
09_abbreviations.pdf48.75 kBAdobe PDFView/Open
10_chapter1.pdf328.7 kBAdobe PDFView/Open
11_chapter2.pdf250.66 kBAdobe PDFView/Open
12_chapter3.pdf186.26 kBAdobe PDFView/Open
13_chapter4.pdf521.38 kBAdobe PDFView/Open
14_chapter5.pdf267.93 kBAdobe PDFView/Open
15_chapter6.pdf68.83 kBAdobe PDFView/Open
16_conclusion.pdf64.89 kBAdobe PDFView/Open
17_bibliography.pdf78.43 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.