Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim… - Scientific Reports, 2024 - nature.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …

DAIWN: Detection and Isolation of Wormhole Nodes in Wireless Ad Hoc Networks

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim - 2023 - researchsquare.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographicmeasures and derail the entire communication network. It is …

[引用][C] Research Article Detection and Isolation of Wormhole Nodes in Wireless Ad Hoc Networks

DS Bhatti, S Saleem, A Imran, BH Lim, KI Kim