Abstract

The nature of wireless sensor networks make them very attractive to attackers. Network layer have ability to swap network service data units between two transport entities above a network connection depending same feature like latency and energy. The network layer deals with directing the information supplied by the transport layer. It is in charge of determining the task of locations and how parcels are sent Routing. Network layer is vulnerable for different types of attacks like a Sinkhole, Wormhole, Sybil, Selective Forwarding, Hello Flood, Black Hole, greyhole and so on. In this paper we survey different attacks on network layer like a black hole and wormhole attack. Black hole attacks attracts network traffic and drop all data packets. One of the most popular and serious attack in wireless sensor network is the wormhole attack. It is an especially severe attack on routing protocols for specially appointed systems in which two or additionally colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. When this attack targets routing control packets, the nodes that are near the attackers are guarded from any option route with more than maybe a couple bounces to the remote area. All routes are along these lines coordinated to the wormhole set up by the attackers. In this work paper make the literature review of detection and prevention of black hole and wormhole attack. Also proposed the trust based mechanism for detection of wormhole attack that is already simulated for black hole attack. Simulation results are used with the NS-2 simulator and attack has been evaluated in term of packet delivery ratio, throughput, delay and routing overhead compare to a network without or with attack. And results shows that performance will be increase.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.