{"title":"基于物联网网络中的虫洞攻击","authors":"Ekin Ecem Tatar, Murat Dener","doi":"10.1109/UBMK52708.2021.9558996","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSNs) from the IoT subset consist of small sensor nodes with limited energy. Such nodes are capable of monitoring physical conditions and transmitting information between nodes without the need for physical media. Due to the lack of central authority and the deployment of random nodes on the network, WSNs and IoTs are prone to security threats and there are many attacks against these networks. Wormhole attack is a serious type of attack that can be resolved smoothly in networks but is difficult to observe. In this study, wormhole attack was shown and interpreted simulation results with simulated graphics in the NS2 simulation program.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Wormhole Attacks in IoT Based Networks\",\"authors\":\"Ekin Ecem Tatar, Murat Dener\",\"doi\":\"10.1109/UBMK52708.2021.9558996\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks (WSNs) from the IoT subset consist of small sensor nodes with limited energy. Such nodes are capable of monitoring physical conditions and transmitting information between nodes without the need for physical media. Due to the lack of central authority and the deployment of random nodes on the network, WSNs and IoTs are prone to security threats and there are many attacks against these networks. Wormhole attack is a serious type of attack that can be resolved smoothly in networks but is difficult to observe. In this study, wormhole attack was shown and interpreted simulation results with simulated graphics in the NS2 simulation program.\",\"PeriodicalId\":106516,\"journal\":{\"name\":\"2021 6th International Conference on Computer Science and Engineering (UBMK)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 6th International Conference on Computer Science and Engineering (UBMK)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UBMK52708.2021.9558996\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 6th International Conference on Computer Science and Engineering (UBMK)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UBMK52708.2021.9558996","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Wireless sensor networks (WSNs) from the IoT subset consist of small sensor nodes with limited energy. Such nodes are capable of monitoring physical conditions and transmitting information between nodes without the need for physical media. Due to the lack of central authority and the deployment of random nodes on the network, WSNs and IoTs are prone to security threats and there are many attacks against these networks. Wormhole attack is a serious type of attack that can be resolved smoothly in networks but is difficult to observe. In this study, wormhole attack was shown and interpreted simulation results with simulated graphics in the NS2 simulation program.