Dealing with Wormhole Attacks in Wireless Sensor Networks Through Discovering Separate Routes Between Nodes
Journal Title: Engineering, Technology & Applied Science Research - Year 2017, Vol 7, Issue 4
Abstract
One of the most common attacks against Wireless Sensor Networks is the wormhole attack. In this attack, the enemy deploys two malicious nodes in two different areas of the network and establishes a high-speed dedicated channel between these two. This will cause the normal nodes in two different areas wrongly think that they are two-hop neighbors. Therefore, this attack will greatly affect the routing algorithms. In this paper, a new distributed algorithm is provided to deal with the wormhole attack. The main idea of the proposed algorithm is to discover separate routes between pairs of two-hop neighboring nodes. The proposed algorithm was implemented and evaluated in terms of true and false detection rate by performing a series of experiments and the results were compared with the base algorithm. The test results showed that the proposed algorithm has desirable efficacy.
Authors and Affiliations
F. Rezaei, A. Zahedi
Improved Genetic and Simulating Annealing Algorithms to Solve the Traveling Salesman Problem Using Constraint Programming
The Traveling Salesman Problem (TSP) is an integer programming problem that falls into the category of NP-Hard problems. As the problem become larger, there is no guarantee that optimal tours will be found within reasona...
Simulating the Various Subsystems of a Coal Mine
A set of simulation models of various subsystems of a coal mine was developed with the help of a new visual interactive simulation system of technological processes. This paper contains a brief description of this simula...
Behaviour of Water Droplets Under the Influence of a Uniform Electric Field in Nanocomposite Samples of Epoxy Resin/TiO2
In this paper nanocomposite samples of epoxy resin and TiO2 nanoparticles were investigated with water droplets on their surface. A uniform electric field was applied and the behaviour of the water droplets was observed....
A Simple Measuring Model for Evaluating the Performance of Small Block Size Accesses in Lustre File System
Storage performance is one of the vital characteristics of a big data environment. Data throughput can be increased to some extent using storage virtualization and parallel data paths. Technology has enhanced the various...
Perspectives of Safe Work Practices: Improving Personal Electrical Safety of Low-Voltage Systems from Electrical Hazards
A person’s understanding of a safety hazard has a dramatic effect on his or her behavior. An in-depth understanding of a hazard usually results in a healthy respect for what can happen. People who know the most about a s...