Paper Title:
A Wormhole Attack Defense Strategy of WSN Based on Node Location Information
  Abstract

Wormhole attack is a kind of attack manner in WSN that does not need to crack network encryption key, which has great harm. Aiming at the characteristics of Wormhole attack, a wormhole attack defense strategy based on node location information was presented. The manner computed physical distance between two nodes through extraction of location information in the packets and compared it with stored threshold, so as to determine whether these packets come from normal communication range. WSN network modeling and simulation results based on OMNeT++ indicates that AODV protocol of defense strategy added sensor node location information can implement successfully defense.

  Info
Periodical
Advanced Materials Research (Volumes 268-270)
Edited by
Feng Xiong
Pages
1055-1060
DOI
10.4028/www.scientific.net/AMR.268-270.1055
Citation
Z. J. Zheng, "A Wormhole Attack Defense Strategy of WSN Based on Node Location Information", Advanced Materials Research, Vols. 268-270, pp. 1055-1060, 2011
Online since
July 2011
Export
Price
$35.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yuan Bai, Zhong Ying Bai
Abstract:Based on analysis of relative and absolute traffic anomalies a fully DIDS(Distributed Intrusion Detection System) is built to detect and...
790
Authors: Yue Li, Ru Jian Ma
Chapter 5 Information System,Industry and Materials
Abstract:A design scheme is proposed in this paper for wireless monitoring system of semi-lean pumps based on ZigBee and XBee-Pro module. The XBee-Pro...
1012
Authors: Jing Xin, Jia Pin Xu
Abstract:At present, the recognition ability of the service recognition technique is limited to single installation. It leads to recognition error...
1473
Authors: Xin Hou, Xing Feng Wei
Chapter 1: Mechatronics
Abstract:This paper mainly introduces the wireless sensor network monitoring system composed of the nodes and the base station. The software and...
1284
Authors: Xiao Dan Chen, Qiang Yue, Li Min Su
Chapter 9: Intelligent and Robotic Systems
Abstract:The paper analyzes the principle and key technique of IPSec protocol, researches the security policy and processing flow of IPSec, presents...
1111