Call for papers :

Submission Last Date 28/02/2018
Status Notification Within 2 Days
Submit Paper Online

Check Paper Status

Paper Status

News & Updates

IJAERD provides Hard Copy of Published Certificates of Publication to each author.

We have started accepting articles by online means directly through website. Article submission link is given on left side

IJAERD Provide Review card, Acceptance Letter and Fee Receipt without taking any extra charges

IJAERD invites research paper from various engineering disciplines for Vol.1 Issue 12 (Dec. - 2014) issue,

Conference Proceedings

National Conference on Emerging Trends in Computer & Electrical Engineering (ETCEE - 2014) March 7-8, 2014, Organized by Atmiya Institute of Technology and Science, Rajkot

National Conference on Recent Research in Engineering and Technology (NCRRET-2015) organizing by Dr. Jivraj Mehta Institute of Technology, Mogar-Anand

National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE - 2015), March 13-14, 2015, Organized by Atmiya Institute of Technology and Science, Rajkot

Paper Details

Paper Title
Security Analysis of Wormhole Attack in WSN
With the tremendous growth of mobile devices, the deployment of wireless sensor networks in the unfavorable environment makes it very popular for research field. Wireless sensor networks (WSN) is widely used in various fields, like Military, Health (Scanning), Space Exploration, Vehicular Movement, Mechanical stress levels on attached objects, Environment monitoring, Weather forecasting, Traffic control, Natural disaster prevention etc. WSN is made of by significant number of nodes deployed in an unfavorable area in which not all nodes are directly connected. The data exchange carried by multihop communications. Routing protocols are responsible for discovering and maintaining the routes in the network. Now a day, Security is prime concern for wireless sensor network. Wireless sensor networks are very weak and susceptible to many types of security attacks, like Sybil attack, Blackhole attack, Flooding attack, Wormhole attack etc. The wormhole attack creates serious issues in WSN, such as routing error, a reduction in sensor lifetime and broken network topology. Several wormhole detection approaches have been proposed, but most of them need special hardware devices and consume a lot of system resources. The main aim for this research to detect wormhole attack in wireless sensor Network (WSN) and at the same time perform rescue task to defend against attack. All the simulation will be performed in NS2.
WSN; Wormhole Attack; RTT; AOMDV; Malicious Node
Others Details
Paper Id : 93894
Author Name : Vishal Makwana
Volume/Issue No : Volume 04 Issue 11
Page No : 38-42
DOI Number : DOI:10.21090/IJAERD.93894
Publication Date : 2017-11-07
License : This work is licensed under a Creative Commons Attribution 4.0 International License.
website :
Impact Factor : 4.72, SJIF-2016
ISSN Details : eISSN: 2348-4470, pISSN:2348-6406