International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 3 | Year 2013 | Article Id. IJCTT-V4I3P110 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I3P110

Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack


Pravin Khandare , Prof. N. P. Kulkarni

Citation :

Pravin Khandare , Prof. N. P. Kulkarni, "Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 3, pp. 247-252, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I3P110

Abstract

Wireless Sensor Network provides various applications like military, healthcare etc. These types of applications required a certain level of security. WSN is exposed by various types of attacks; wormhole is one of severe attack on WSN. In wormhole attack, an attacker receives packet from one location pass them through the tunnel and release to them another location. We propose an algorithm which defends wormhole attack in WSN called public key encryption and 2Ack based approach. Proposed approach provides security and finds misbehaving nodes in the network.

Keywords

Wireless Sensor Network, wormhole attack.

References

[1] Ali modirkhazeni, Saeedeh Aghamahamoodi, Asarlan Modirkhazeni and Naghmeh Niknejad,“Distributed Approach To Mitigate Wormhole Attack in Wireless Sensor Network ”,2011IEEE , page no. 122-128
[2] Dhara Buch, Devesh Jinwala “Detection of wormhole attack in Wireless Sensor”, Proc of international conference on Advances in Recent Technologies In communication computing 2011, Page no. 7- 14
[3] Prabhudatta Mohanty, Sangram Panigrahi, Nityananda Sharma and Siddhartha Sankar Satapathy,“Security Issues In Wireless Sensor Network Data Gathering Protocols : A Survey ”Journal of Theoretical & Applied Information Technology 2005-2010 JATIT, Page no. 14-27
[4] Al-Sakib Khan Pathan, Hyung –Woo Lee Choong Seon Hong, “ Security In Wireless Sensor Networks : Issues & Challenges” Feb 20-22, 2006 ICACT 2006 , ISBN 89-5519-129-4, Page no. 1043- 1048R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997.
[5] Xiaujiang Dv, Hsiao-HWACHEN, “Security In a Wireless Sensor Network ”, IEEE Wireless Communication, August 2008, Page no. 60- 66
[6] Abhishek Jain, Kamal Kant, M. R. Tripathy,“ Security Solutions For Wireless Sensor Networks ” Second International Conference In Advanced Computing and Communication Technologies, 2012 IEEE, Page no. 430-433
[7] Sanzgiri , Kimaya, “ A Secure Routing Protocol For Ad Hoc Networks ” ,2002, 10th IEEE International Conference, Page no. 78-87
[8] Gunhee Lee, Dong-kyoo Kim, Jungtaek Seo, “An Approach To Mitigate Wormhole Attack In Wireless Ad Hoc Networks”
[9] Marianne A. Azer, Skeriff  M.El-kassas, Magdy S. El-soudani, “ An Innovative Approach For Wormhole Attack Detection & Prevention In Wireless Adhoc Networks”, 2010 IEEE
[10] Amar Rasheed, Rabi Mahapatra, “ Mobile Sink Using Multiple Channels to Defend Against Wormhole Attacks In Wireless Sensor Networks ” ,2009 IEEE, Page no. 216-222
[11] Amar Rasheed, Rabi Mahapatra, “ Mobile Sink Using Multiple Channels to Defend Against Wormhole Attacks In Wireless Sensor Networks ” ,2009 IEEE, Page no. 216-222
[12] Phoung Van Tran, Le Xuan Hung, Young-Koo Lee, Sungyoun Lee, Heejo Lee, “TTM: An Efficient Mechanisms To Detect Wormhole Attacks In Wireless Adhoc Networks” 2007IEEE
[13] Vijaya K., “Secure 2ACK routing protocol in Mobile Ad Hoc Networks”,TENCON 2008-2008 IEEE Region 10 conference, Page no. 1-7