Red Paper
International Journal of Computing and Artificial Intelligence

Impact Factor (RJIF): 5.57, P-ISSN: 2707-6571, E-ISSN: 2707-658X
Printed Journal   |   Refereed Journal   |   Peer Reviewed Journal
Peer Reviewed Journal

2025, Vol. 6, Issue 1, Part C

To detect (D) worm hole attack in wireless sensor network from various kind of attack


Author(s): Jagathese G Chelladurai and Mona Dwivedi

Abstract: This chapterrnanalyzes wormhole variations and their effects on wireless sensor networks.rnAdditionally, a review of current defenses against wormhole variations suchrnsinkholes, service denial, black holes, etc. is provided. Wormhole attacksrnbased on sinkholes are covered in Section 1.1. Wormhole attacks based on denialrnof service are covered in Section 1.2. Wormhole attacks based on black holesrnare covered in Section 1.3. We covered current defenses against differentrnwormhole assaults in section 1.4. presents the effects of wormhole assaultrnvariations.
The smart attackrndetection strategy, which is used to identify the many types of denial ofrnservice assaults in wireless ad hoc networks, has been offered as a novelrnmethod to circumvent this problem. Four different sorts of assaults may berndetected using this clever attack detection technique.
Generally speaking,rnidentifying the different harmful attack types is more crucial than identifyingrnbad nodes. This method allows one to identify the kind of harmful assault andrnthen create the ideal future remedy. The botnet attack, black hole assault,rnworm hole attack, and sink hole attack have all been identified using the smartrnattack detection technique. When the overflow occurs to the specific node, arnbotnet assault will take place.


DOI: 10.33545/27076571.2025.v6.i1c.155

Pages: 200-207 | Views: 260 | Downloads: 66

Download Full Article: Click Here

International Journal of Computing and Artificial Intelligence
How to cite this article:
Jagathese G Chelladurai, Mona Dwivedi. To detect (D) worm hole attack in wireless sensor network from various kind of attack. Int J Comput Artif Intell 2025;6(1):200-207. DOI: 10.33545/27076571.2025.v6.i1c.155
International Journal of Computing and Artificial Intelligence

International Journal of Computing and Artificial Intelligence

International Journal of Computing and Artificial Intelligence
Call for book chapter
Journals List Click Here Research Journals Research Journals