Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks
نویسندگان
چکیده
Wireless Sensor Networks (WSNs) gained wide attention in the past decade, thanks to its attractive features like flexibility, monitoring capability, and scalability. It overcomes crucial problems experienced network management facilitates development of diverse architectures. The existence dynamic adaptive routing facilitate quick formation such networks. But flexible architecture also makes it highly vulnerable different sorts attacks, for instance, Denial Service (DoS). Grey Hole Attack (GHA) is most attack types since creates a heavy impact upon components WSN eventually degrades performance network. In current study, simple detection, prevention reduction approach proposed. This secure from GHA other attacks by warning blocking malicious suspensions examining storage table. Instead entire host, presented specifically eliminates nodes. Further, case no traffic host gets unblocked. researchers simulated model under MATLAB environment outcomes showed an enhanced increased utilization Central Processing Unit (CPU) packet delivery ratio.
منابع مشابه
Routing Hole Handling Techniques for Wireless Sensor Networks: A Review
A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملWormhole Attack Detection in Wireless Sensor Networks
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending me...
متن کاملCoverage Hole Detection in Wireless Sensor Networks
Wireless sensor network is the area where many researchers are focusing. The emerging technology of WSN is expected to provide a broad range of applications, such as battlefield surveillance, environmental monitoring and smart space and so on. Coverage is the important quality of service which is provided by the wireless sensor network. The coverage hole problem is a fundamental issue in WSN. T...
متن کاملDetection and Isolation of Black Hole Attack in Wireless Sensor Networks
The Sensor nodes are connected wirelessly to form a network called as the wireless sensor network (WSN). The nodes have confined battery power and the battery of the nodes cannot be replaced. These sensor nodes are used for collecting the sensor data and transmits them to the sink or base station. This data transmission from a node to the other node utilizes more energy if the data is broadcast...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer systems science and engineering
سال: 2022
ISSN: ['0267-6192']
DOI: https://doi.org/10.32604/csse.2022.020993