Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs

2019 ◽  
Vol 15 (2) ◽  
pp. 1-20 ◽  
Author(s):  
Wael Alghamdi ◽  
Mohsen Rezvani ◽  
Hui Wu ◽  
Salil S. Kanhere
2017 ◽  
Vol 11 (1) ◽  
pp. 35-51 ◽  
Author(s):  
Mukesh Kumar ◽  
Kamlesh Dutta

Wireless networks are used by everyone for their convenience for transferring packets from one node to another without having a static infrastructure. In WSN, there are some nodes which are light weight, small in size, having low computation overhead, and low cost known as sensor nodes. In literature, there exists many secure data aggregation protocols available but they are not sufficient to detect the malicious node. The authors require a better security mechanism or a technique to secure the network. Data aggregation is an essential paradigm in WSN. The idea is to combine data coming from different source nodes in order to achieve energy efficiency. In this paper, the authors proposed a protocol for worm hole attack detection during data aggregation in WSN. Main focus is on wormhole attack detection and its countermeasures.


Sign in / Sign up

Export Citation Format

Share Document