IJSDR
IJSDR
INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15

Issue: April 2024

Volume 9 | Issue 4

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: Threshold based scheme for isolation of Wormhole Attack in WSN
Authors Name: Jasjit Kaur , Pratibha
Unique Id: IJSDR2105047
Published In: Volume 6 Issue 5, May-2021
Abstract: Out of many attacks in wireless sensor network, the wormhole attack is pretty dangerous one as it is launched using two pairs of malicious nodes with create a tunnel by skipping few nodes in between source and destination node. The existing scheme considers the wormhole attacks when there are no intermediate nodes present between destinations. This technique is suitable for scenarios where the path length between source and destination is two hops only. This scheme cannot be used for networks with layer hops between source and destination node. In this research work, we are proposing a threshold based scheme for the detection and isolation of malicious nodes in the network. The malicious nodes are responsible to trigger wormhole attack in the network. As per hop delay is already calculated in the network and node which is increasing the per hop delay than defined value is detected as the malicious node. When the malicious node is detected from the network then the source node will send alert message to each node in the network. When the node receives the alert message, it will remove the malicious node from the path. The technique is efficient in terms of complexity and also various congestion values are included for the detection of malicious nodes. In this phase, the malicious nodes get isolated from the network with the approach of multipath routing. The sensor nodes which increase per hop delay is detected as the malicious nodes. The proposed technique is implemented in NS2 and simulation results shows that proposed technique performs well as compared to other techniques.
Keywords: Wireless Sensor Network, WSN Security, Wormhole Attack, Availability.
Cite Article: "Threshold based scheme for isolation of Wormhole Attack in WSN", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.6, Issue 5, page no.284 - 290, May-2021, Available :http://www.ijsdr.org/papers/IJSDR2105047.pdf
Downloads: 000337209
Publication Details: Published Paper ID: IJSDR2105047
Registration ID:193328
Published In: Volume 6 Issue 5, May-2021
DOI (Digital Object Identifier):
Page No: 284 - 290
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview







Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
ISSN
DOI (A digital object identifier)


Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media
IJSDR

Indexing Partner