Abstract

In some applications, wireless sensor devices must be secured, especially when the captured information is valuable and sensitive. The wormhole attack is a significant type of security attack that can damage wireless sensor networks if they go undetected. It occurs when the attacker records packets at one point of the network, and then passes them into a different node. This node then injects the packets into the network again. In this tutorial article, an actual test bed called BANAID. It describes a simulated wormhole attack against wireless sensor networks. In addition, a recently developed solution against this attack is implemented.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call