K. Thilak, S. Saranya, K. Kalaiselvi, M. Anand, K. Kumaresan
{"title":"基于虫洞攻击检测的无线自组网数据传输安全","authors":"K. Thilak, S. Saranya, K. Kalaiselvi, M. Anand, K. Kumaresan","doi":"10.1109/ICSSS54381.2022.9782298","DOIUrl":null,"url":null,"abstract":"Wireless Network Coding System encrypts data as it travels via intermediate nodes for secure data transmission, Wormhole attackers choose one of the nodes to target. The attacked node tries to attack other nodes, forming a wormhole tunnel in the process. When a wormhole attack is launched, Information bundles on one or the other side of the wormhole connection can be caught, sent through the wormhole connection, and rebroadcast on the other hub. Network coding has been proved to be an excellent method for improving the performance of wireless systems. To detect wormholes, a centralized approach is presented initially, and its accuracy is rigorously demonstrated. A circulated discovery calculation against wormhole in remote organization coding frameworks is proposed. The assaulting hubs are caught on the two sides of the organization, and afterward isolated from the remainder of the organization. Bundle misfortune is brought about by assaulted hubs; to avoid packet loss, data is transmitted by separating the attacked node from the network. By separating the attacked nodes from the source node to the destination node, the packets are retransmitted. The shortest path across the path that is not affected is determined and the packets are attempted to transmit from the source to send the packets effectively and successfully.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Data Transmission in Wireless Adhoc Networks by Detecting Wormhole Attack\",\"authors\":\"K. Thilak, S. Saranya, K. Kalaiselvi, M. Anand, K. Kumaresan\",\"doi\":\"10.1109/ICSSS54381.2022.9782298\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Network Coding System encrypts data as it travels via intermediate nodes for secure data transmission, Wormhole attackers choose one of the nodes to target. The attacked node tries to attack other nodes, forming a wormhole tunnel in the process. When a wormhole attack is launched, Information bundles on one or the other side of the wormhole connection can be caught, sent through the wormhole connection, and rebroadcast on the other hub. Network coding has been proved to be an excellent method for improving the performance of wireless systems. To detect wormholes, a centralized approach is presented initially, and its accuracy is rigorously demonstrated. A circulated discovery calculation against wormhole in remote organization coding frameworks is proposed. The assaulting hubs are caught on the two sides of the organization, and afterward isolated from the remainder of the organization. Bundle misfortune is brought about by assaulted hubs; to avoid packet loss, data is transmitted by separating the attacked node from the network. By separating the attacked nodes from the source node to the destination node, the packets are retransmitted. The shortest path across the path that is not affected is determined and the packets are attempted to transmit from the source to send the packets effectively and successfully.\",\"PeriodicalId\":186440,\"journal\":{\"name\":\"2022 8th International Conference on Smart Structures and Systems (ICSSS)\",\"volume\":\"76 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 8th International Conference on Smart Structures and Systems (ICSSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSSS54381.2022.9782298\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSS54381.2022.9782298","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Data Transmission in Wireless Adhoc Networks by Detecting Wormhole Attack
Wireless Network Coding System encrypts data as it travels via intermediate nodes for secure data transmission, Wormhole attackers choose one of the nodes to target. The attacked node tries to attack other nodes, forming a wormhole tunnel in the process. When a wormhole attack is launched, Information bundles on one or the other side of the wormhole connection can be caught, sent through the wormhole connection, and rebroadcast on the other hub. Network coding has been proved to be an excellent method for improving the performance of wireless systems. To detect wormholes, a centralized approach is presented initially, and its accuracy is rigorously demonstrated. A circulated discovery calculation against wormhole in remote organization coding frameworks is proposed. The assaulting hubs are caught on the two sides of the organization, and afterward isolated from the remainder of the organization. Bundle misfortune is brought about by assaulted hubs; to avoid packet loss, data is transmitted by separating the attacked node from the network. By separating the attacked nodes from the source node to the destination node, the packets are retransmitted. The shortest path across the path that is not affected is determined and the packets are attempted to transmit from the source to send the packets effectively and successfully.