Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim… - Scientific Reports, 2024 - nature.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …

[PDF][PDF] Distributed wormhole attack mitigation technique in WSNs

S Kori, GN Krishnamurthy, N Sidnal - Int. J. Comput. Netw. Inf …, 2019 - academia.edu
Sensing element Networks area unit gaining a lot of attention as a result of applications like
sensible cities (traffic congestion, sensible parking, sensible lighting), sensible setting (forest …

DAIWN: Detection and Isolation of Wormhole Nodes in Wireless Ad Hoc Networks

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim - 2023 - researchsquare.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographicmeasures and derail the entire communication network. It is …