The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objective: To provide Message authentication and detect the wormhole attacks in the wireless sensor networks.

Methods: Source anonymous message authentication (SAMA) scheme is used for Hop-by-Hop Message Authentication. In Hop-by-Hop Message Authentication process each nodes in the routing path is confirm the authentication and integrity of the messages. A wormhole attack causes several damages while routing. Here the system introduces Enhanced Wormhole attack Detection (EWAD) based on per hop latency which is used for detect the wormhole attack. Per Hop latency is calculated based on round trip time (RTT) while route discovery phase.

Results: In this experimental analysis, the performance of proposed system is highly efficient in terms of energy consumption, end to end delay.

Conclusion: The system offers an efficient hop-by-hop message authentication mechanism for WSNs without any threshold limitation. Wormhole attack is one of routing attack that can be occurred during routing process. To detect that attacks Per Hop latency is computed based on round trip time (RTT).According to that value wormhole attack can be detected.


Keywords

Message Authentication, Wireless Sensor Networks, Round Trip Time, Hop Latency.
User
Notifications