Issues and Challenges of Wormhole Attack Detection for Secure Localization in WSNs

Ruchi Garg, Tarun Gulati
{"title":"Issues and Challenges of Wormhole Attack Detection for Secure Localization in WSNs","authors":"Ruchi Garg, Tarun Gulati","doi":"10.1109/InCACCT57535.2023.10141721","DOIUrl":null,"url":null,"abstract":"The field sensed data always requires to have location of the sensors for approximating the place of events in a field of observation. However, localization is a well-established research problem in wireless sensor networks (WSNs). Further, considering a network under ideal conditions free from all network snags, for the localization, is an erratic postulate. Therefore, localization should consider some common network snags like wormhole attack. Though wormhole attack is comparatively easy to implement yet it has a devastating effect on localization. There are a few algorithms to address the wormhole attack detection in the literature. Some of the recent time wormhole attack detection algorithms are studied here. The study categorizes the existing algorithms based on various attributes. The analysis of the existing algorithms is comprehended with the future issues and challenges in wormhole attack detection. Further, the study reveals that most of the existing algorithms get affected by varying network traffic, increased computation and communication efforts, additional hardware cost, distance among the sensors, and mobility rate. In this manner, it is established that the secure localization requires detection of wormhole attack before localizing sensors where sensors should not get distressed due to wormhole attack detection.","PeriodicalId":405272,"journal":{"name":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/InCACCT57535.2023.10141721","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The field sensed data always requires to have location of the sensors for approximating the place of events in a field of observation. However, localization is a well-established research problem in wireless sensor networks (WSNs). Further, considering a network under ideal conditions free from all network snags, for the localization, is an erratic postulate. Therefore, localization should consider some common network snags like wormhole attack. Though wormhole attack is comparatively easy to implement yet it has a devastating effect on localization. There are a few algorithms to address the wormhole attack detection in the literature. Some of the recent time wormhole attack detection algorithms are studied here. The study categorizes the existing algorithms based on various attributes. The analysis of the existing algorithms is comprehended with the future issues and challenges in wormhole attack detection. Further, the study reveals that most of the existing algorithms get affected by varying network traffic, increased computation and communication efforts, additional hardware cost, distance among the sensors, and mobility rate. In this manner, it is established that the secure localization requires detection of wormhole attack before localizing sensors where sensors should not get distressed due to wormhole attack detection.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线传感器网络安全定位中虫洞攻击检测的问题与挑战
现场感测数据总是要求有传感器的位置,以近似事件在观测场中的位置。然而,定位是无线传感器网络(WSNs)中一个成熟的研究问题。此外,考虑一个没有任何网络障碍的理想条件下的网络,对于定位来说,是一个不稳定的假设。因此,本地化应该考虑一些常见的网络障碍,如虫洞攻击。虽然虫洞攻击相对容易实现,但它对本地化有着毁灭性的影响。在文献中有一些算法来解决虫洞攻击检测。本文对近年来的一些虫洞攻击检测算法进行了研究。该研究基于各种属性对现有算法进行分类。分析了现有的算法,了解了虫洞攻击检测中存在的问题和面临的挑战。此外,研究表明,大多数现有算法受到不同网络流量、增加的计算和通信工作量、额外的硬件成本、传感器之间的距离和移动性的影响。通过这种方式,确定了安全定位需要在定位传感器之前检测到虫洞攻击,传感器不会因为虫洞攻击检测而陷入困境。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Use of Swarm intelligence algorithms in Internet of Things-based systems: A Comprehensive review Data driven approach to identify a flow-based Botnet Host using Deep Learning Underwater image re-enhancement with blend of Simplest Colour Balance and Contrast Limited Adaptive Histogram Equalization Algorithm Intelligent Control Design for Quadrotor Perching Application using Neural-Network Augmented Direct Inversion Control Approach Designing of an Efficient Model for Violence Detection Using Advance Deep Learning Techniques
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1