Abstract

Abstract: A Wireless Sensor Network (WSN) made up of spatially dispersed independent devices using sensors is vulnerable to many different types of threats and attacks due to a number of factors, including the unattended deployment in an untrusted environment, the limited network resources, the ease of network access, and the range of radio transmission. One of these weaknesses is the wormhole attack, in which a hacker sets up a low-latency link between sensor nodes in order to sabotage them, use up network resources, and steal sensitive information. This essay outlines the WSN wormhole attack and provides a critical assessment of the defences. Wireless sensor network defences against wormhole attacks and wormhole detection methods are contrasted and evaluated for their efficacy (WSN). Because there are unwanted attackers present, secure communication is absolutely necessary for the community. The bundle appears to be disintegrating, but most likely due to the attacker, according to the wormhole. If the intrusion is discovered in time, the perpetrator can be found and expelled from the network before any potentially dangerous actions are taken or data is corrupted. Similar to that, the suggested Worm hole serves as a deterrent and protects you. Information on entrance tactics that might be utilised to protect the access point can be found using the suggested device. The performance of the prior device, which is also the best and safest network to use, can be used to assess the correctness of the results. The packets connecting the nodes to the network can be used to calculate the agreement's cost

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call