Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Wormhole Attack

Handbook of Research on Wireless Security
In a wormhole attack, an attacker receives packets at one point in the network, “tunnels” them to another point in the network, and then replays them into the network from that point
Published in Chapter:
Security and Privacy in Wireless Sensor Networks: Challenges and Solutions
Mohamed Hamdi (University of November 7th at Carthage, Tunisia) and Noreddine Boudriga (University of November 7th at Carthage, Tunisia)
Copyright: © 2008 |Pages: 17
DOI: 10.4018/978-1-59904-899-4.ch035
Abstract
The applications of wireless sensor networks (WSNs) are continuously expanding. Recently, consistent research and development activities have been associated to this field. Security ranks at the top of the issues that should be discussed when deploying a WSN. This is basically due to the fact that WSNs are, by nature, mission-critical. Their applications mainly include battlefield control, emergency response (when a natural disaster occurs), and healthcare. This chapter reviews recent research results in the field of WSN security.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR