@inproceedings{e182f0c4b38944cba6c90ce8dda9ba3c,
title = "Defenses against wormhole attacks in wireless sensor networks",
abstract = "Based on analyzing the characteristics of wormhole attacks in the wireless sensor networks, this paper proposes two kinds of defense strategies, which are based on monitoring neighbor node and node location information, in order to achieve effective defense against wormhole attacks using packet encapsulation. We simulate the running state of the static wireless sensor network under normal conditions and under the wormhole attack by using OMNeT++ simulation platform. And the network running process under wormhole attack is simulated in the case of applying the defense strategy based on monitoring neighbor node and the defense strategy based on node location information respectively. By analyzing the specific defense effect, the simulation results highlight the effectiveness of the proposed defense strategy.",
keywords = "Defense, Monitoring neighbor node, Node location information, Wireless sensor networks, Wormhole attack",
author = "Rui Ma and Siyu Chen and Ke Ma and Changzhen Hu and Xiajing Wang",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing AG 2017.; 11th International Conference on Network and System Security, NSS 2017 ; Conference date: 21-08-2017 Through 23-08-2017",
year = "2017",
doi = "10.1007/978-3-319-64701-2_30",
language = "English",
isbn = "9783319647005",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "413--426",
editor = "Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola",
booktitle = "Network and System Security - 11th International Conference, NSS 2017, Proceedings",
address = "Germany",
}