International Journal of Wireless Communications and Network Technologies
Latest Publications


TOTAL DOCUMENTS

19
(FIVE YEARS 18)

H-INDEX

0
(FIVE YEARS 0)

Published By The World Academy Of Research In Science And Engineering

2319-6629

Due to the wide range of applications in public and military domains, wireless sensor network (WSN) is evolving as a popular technology. This WSN consists of a large number of sensors that are spread across a geographical area thatare self-configuring in nature. These nodes are of low cost and resource-constrained nodes. Because these reasons the network becomes vulnerable to many network attacks. There are many types of attacks among which one of the serious attacks is the sinkhole attack, which is one of the destructive routing attacks. It causes the adversary node to attract all or most of the traffic from the neighbors by broadcasting false routing updates of having the shortest path to the central station. This paper is a survey on various methods implemented to overcome sinkhole attacks like Hop Count Monitoring scheme, Key Management Approach, Message-Digest Algorithm.


Sign in / Sign up

Export Citation Format

Share Document