Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - Issue 2013 by IJCTT Journal|
|Volume-4 Issue-3 |
|Year of Publication : 2013|
|Authors :Pravin Khandare , Prof. N. P. Kulkarni|
Pravin Khandare , Prof. N. P. Kulkarni"Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack"International Journal of Computer Trends and Technology (IJCTT),V4(3):247-252 Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: - Wireless Sensor Network provides various applications like military, healthcare etc. These types of applications required a certain level of security. WSN is exposed by various types of attacks; wormhole is one of severe attack on WSN. In wormhole attack, an attacker receives packet from one location pass them through the tunnel and release to them another location. We propose an algorithm which defends wormhole attack in WSN called public key encryption and 2Ack based approach. Proposed approach provides security and finds misbehaving nodes in the network.
 Ali modirkhazeni, Saeedeh Aghamahamoodi, Asarlan Modirkhazeni and Naghmeh Niknejad,“Distributed Approach To Mitigate Wormhole Attack in Wireless Sensor Network ”,2011IEEE , page no. 122-128
 Dhara Buch, Devesh Jinwala “Detection of wormhole attack in Wireless Sensor”, Proc of international conference on Advances in Recent Technologies In communication computing 2011, Page no. 7- 14
 Prabhudatta Mohanty, Sangram Panigrahi, Nityananda Sharma and Siddhartha Sankar Satapathy,“Security Issues In Wireless Sensor Network Data Gathering Protocols : A Survey ”Journal of Theoretical & Applied Information Technology 2005-2010 JATIT, Page no. 14-27
 Al-Sakib Khan Pathan, Hyung –Woo Lee Choong Seon Hong, “ Security In Wireless Sensor Networks : Issues & Challenges” Feb 20-22, 2006 ICACT 2006 , ISBN 89-5519-129-4, Page no. 1043- 1048R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997.
 Xiaujiang Dv, Hsiao-HWACHEN, “Security In a Wireless Sensor Network ”, IEEE Wireless Communication, August 2008, Page no. 60- 66
 Abhishek Jain, Kamal Kant, M. R. Tripathy,“ Security Solutions For Wireless Sensor Networks ” Second International Conference In Advanced Computing and Communication Technologies, 2012 IEEE, Page no. 430-433
 Sanzgiri , Kimaya, “ A Secure Routing Protocol For Ad Hoc Networks ” ,2002, 10th IEEE International Conference, Page no. 78-87
 Gunhee Lee, Dong-kyoo Kim, Jungtaek Seo, “An Approach To Mitigate Wormhole Attack In Wireless Ad Hoc Networks”
Keywords— Wireless Sensor Network, wormhole attack.