2025, Vol. 6, Issue 1, Part C
To detect (D) worm hole attack in wireless sensor network from various kind of attack
Author(s): Jagathese G Chelladurai and Mona Dwivedi
Abstract: This chapterrnanalyzes wormhole variations and their effects on wireless sensor networks.rnAdditionally, a review of current defenses against wormhole variations suchrnsinkholes, service denial, black holes, etc. is provided. Wormhole attacksrnbased on sinkholes are covered in Section 1.1. Wormhole attacks based on denialrnof service are covered in Section 1.2. Wormhole attacks based on black holesrnare covered in Section 1.3. We covered current defenses against differentrnwormhole assaults in section 1.4. presents the effects of wormhole assaultrnvariations.
The smart attackrndetection strategy, which is used to identify the many types of denial ofrnservice assaults in wireless ad hoc networks, has been offered as a novelrnmethod to circumvent this problem. Four different sorts of assaults may berndetected using this clever attack detection technique.
Generally speaking,rnidentifying the different harmful attack types is more crucial than identifyingrnbad nodes. This method allows one to identify the kind of harmful assault andrnthen create the ideal future remedy. The botnet attack, black hole assault,rnworm hole attack, and sink hole attack have all been identified using the smartrnattack detection technique. When the overflow occurs to the specific node, arnbotnet assault will take place.
DOI: 10.33545/27076571.2025.v6.i1c.155Pages: 200-207 | Views: 260 | Downloads: 66Download Full Article: Click Here
How to cite this article:
Jagathese G Chelladurai, Mona Dwivedi.
To detect (D) worm hole attack in wireless sensor network from various kind of attack. Int J Comput Artif Intell 2025;6(1):200-207. DOI:
10.33545/27076571.2025.v6.i1c.155