Secure Data Transmission in Wireless Adhoc Networks by Detecting Wormhole Attack

K. Thilak, S. Saranya, K. Kalaiselvi, M. Anand, K. Kumaresan
{"title":"Secure Data Transmission in Wireless Adhoc Networks by Detecting Wormhole Attack","authors":"K. Thilak, S. Saranya, K. Kalaiselvi, M. Anand, K. Kumaresan","doi":"10.1109/ICSSS54381.2022.9782298","DOIUrl":null,"url":null,"abstract":"Wireless Network Coding System encrypts data as it travels via intermediate nodes for secure data transmission, Wormhole attackers choose one of the nodes to target. The attacked node tries to attack other nodes, forming a wormhole tunnel in the process. When a wormhole attack is launched, Information bundles on one or the other side of the wormhole connection can be caught, sent through the wormhole connection, and rebroadcast on the other hub. Network coding has been proved to be an excellent method for improving the performance of wireless systems. To detect wormholes, a centralized approach is presented initially, and its accuracy is rigorously demonstrated. A circulated discovery calculation against wormhole in remote organization coding frameworks is proposed. The assaulting hubs are caught on the two sides of the organization, and afterward isolated from the remainder of the organization. Bundle misfortune is brought about by assaulted hubs; to avoid packet loss, data is transmitted by separating the attacked node from the network. By separating the attacked nodes from the source node to the destination node, the packets are retransmitted. The shortest path across the path that is not affected is determined and the packets are attempted to transmit from the source to send the packets effectively and successfully.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSS54381.2022.9782298","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Wireless Network Coding System encrypts data as it travels via intermediate nodes for secure data transmission, Wormhole attackers choose one of the nodes to target. The attacked node tries to attack other nodes, forming a wormhole tunnel in the process. When a wormhole attack is launched, Information bundles on one or the other side of the wormhole connection can be caught, sent through the wormhole connection, and rebroadcast on the other hub. Network coding has been proved to be an excellent method for improving the performance of wireless systems. To detect wormholes, a centralized approach is presented initially, and its accuracy is rigorously demonstrated. A circulated discovery calculation against wormhole in remote organization coding frameworks is proposed. The assaulting hubs are caught on the two sides of the organization, and afterward isolated from the remainder of the organization. Bundle misfortune is brought about by assaulted hubs; to avoid packet loss, data is transmitted by separating the attacked node from the network. By separating the attacked nodes from the source node to the destination node, the packets are retransmitted. The shortest path across the path that is not affected is determined and the packets are attempted to transmit from the source to send the packets effectively and successfully.
基于虫洞攻击检测的无线自组网数据传输安全
无线网络编码系统在数据通过中间节点传输时对数据进行加密,以保证数据传输的安全性,虫洞攻击者可以选择其中一个节点作为攻击目标。被攻击的节点试图攻击其他节点,在此过程中形成虫洞隧道。当发起虫洞攻击时,虫洞连接的一侧或另一侧的信息包可以被捕获,通过虫洞连接发送,并在另一个集线器上重播。网络编码已被证明是提高无线系统性能的一种极好的方法。针对虫洞的检测问题,提出了一种集中式的虫洞检测方法,并对其准确性进行了验证。提出了一种针对远程组织编码框架中虫洞的循环发现计算方法。攻击中心位于组织的两侧,然后与组织的其余部分隔离开来。Bundle的不幸是由被攻击的枢纽带来的;为了避免丢包,将被攻击的节点与网络隔离,实现数据传输。通过将攻击节点从源节点分离到目的节点,报文被重传。确定不受影响的路径上的最短路径,并尝试从源发送数据包,以有效成功地发送数据包。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信