{"title":"无线传感器网络安全定位中虫洞攻击检测的问题与挑战","authors":"Ruchi Garg, Tarun Gulati","doi":"10.1109/InCACCT57535.2023.10141721","DOIUrl":null,"url":null,"abstract":"The field sensed data always requires to have location of the sensors for approximating the place of events in a field of observation. However, localization is a well-established research problem in wireless sensor networks (WSNs). Further, considering a network under ideal conditions free from all network snags, for the localization, is an erratic postulate. Therefore, localization should consider some common network snags like wormhole attack. Though wormhole attack is comparatively easy to implement yet it has a devastating effect on localization. There are a few algorithms to address the wormhole attack detection in the literature. Some of the recent time wormhole attack detection algorithms are studied here. The study categorizes the existing algorithms based on various attributes. The analysis of the existing algorithms is comprehended with the future issues and challenges in wormhole attack detection. Further, the study reveals that most of the existing algorithms get affected by varying network traffic, increased computation and communication efforts, additional hardware cost, distance among the sensors, and mobility rate. In this manner, it is established that the secure localization requires detection of wormhole attack before localizing sensors where sensors should not get distressed due to wormhole attack detection.","PeriodicalId":405272,"journal":{"name":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Issues and Challenges of Wormhole Attack Detection for Secure Localization in WSNs\",\"authors\":\"Ruchi Garg, Tarun Gulati\",\"doi\":\"10.1109/InCACCT57535.2023.10141721\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The field sensed data always requires to have location of the sensors for approximating the place of events in a field of observation. However, localization is a well-established research problem in wireless sensor networks (WSNs). Further, considering a network under ideal conditions free from all network snags, for the localization, is an erratic postulate. Therefore, localization should consider some common network snags like wormhole attack. Though wormhole attack is comparatively easy to implement yet it has a devastating effect on localization. There are a few algorithms to address the wormhole attack detection in the literature. Some of the recent time wormhole attack detection algorithms are studied here. The study categorizes the existing algorithms based on various attributes. The analysis of the existing algorithms is comprehended with the future issues and challenges in wormhole attack detection. Further, the study reveals that most of the existing algorithms get affected by varying network traffic, increased computation and communication efforts, additional hardware cost, distance among the sensors, and mobility rate. In this manner, it is established that the secure localization requires detection of wormhole attack before localizing sensors where sensors should not get distressed due to wormhole attack detection.\",\"PeriodicalId\":405272,\"journal\":{\"name\":\"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/InCACCT57535.2023.10141721\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/InCACCT57535.2023.10141721","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Issues and Challenges of Wormhole Attack Detection for Secure Localization in WSNs
The field sensed data always requires to have location of the sensors for approximating the place of events in a field of observation. However, localization is a well-established research problem in wireless sensor networks (WSNs). Further, considering a network under ideal conditions free from all network snags, for the localization, is an erratic postulate. Therefore, localization should consider some common network snags like wormhole attack. Though wormhole attack is comparatively easy to implement yet it has a devastating effect on localization. There are a few algorithms to address the wormhole attack detection in the literature. Some of the recent time wormhole attack detection algorithms are studied here. The study categorizes the existing algorithms based on various attributes. The analysis of the existing algorithms is comprehended with the future issues and challenges in wormhole attack detection. Further, the study reveals that most of the existing algorithms get affected by varying network traffic, increased computation and communication efforts, additional hardware cost, distance among the sensors, and mobility rate. In this manner, it is established that the secure localization requires detection of wormhole attack before localizing sensors where sensors should not get distressed due to wormhole attack detection.