Wormhole attack detection system for IoT network: A hybrid approach

SA Bhosale, SS Sonavane - Wireless Personal Communications, 2022 - Springer
Many errors in data communication cause security attacks in Internet of Things (IoT). Routing
errors at network layer are prominent errors in IoT which degrade the quality of data …

Intrusion detection of wormhole attack in IoT: A review

M Goyal, M Dutta - … Conference on Circuits and Systems in …, 2018 - ieeexplore.ieee.org
Internet of Things is a new paradigm that is rapidly making progress in the present wireless
communications. It semantically implies a worldwide network of connected objects, uniquely …

[PDF][PDF] Energy optimised security against wormhole attack in iot-based wireless sensor networks

H Shahid, H Ashraf, H Javed, M Humayun… - Comput. Mater …, 2021 - cdn.techscience.cn
An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the
data and share it with the central repositories. These sensors are battery-driven and …

DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system

S Jamali, R Fotohi - the Journal of Supercomputing, 2017 - Springer
Mobile ad hoc networks (MANETs) are mobile networks, which are automatically outspread
on a geographically limited region, without requiring any preexisting infrastructure. Mostly …

Defending against wormhole attack in MANET using an artificial immune system

S Jamali, R Fotohi - New Review of Information Networking, 2016 - Taylor & Francis
MANETs are mobile networks that are spontaneously deployed over a geographically
limited area without requiring any pre-existing infrastructure. Typically, nodes are both …

CREDND: A novel secure neighbor discovery algorithm for wormhole attack

X Luo, Y Chen, M Li, Q Luo, K Xue, S Liu… - IEEE Access, 2019 - ieeexplore.ieee.org
As nodes' characteristics that they are self-governed and resource-limited, wireless sensor
networks (WSNs) face potential threats due to various attacks, among which the most …

Defending against wormhole attack in MANET

A Patel, N Patel, R Patel - 2015 fifth international conference on …, 2015 - ieeexplore.ieee.org
In the generation of wireless communication, MANET has become an undividable and
acceptable part for communication for mobile equipments. Therefore, interest in research of …

Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim… - Scientific Reports, 2024 - nature.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …

[PDF][PDF] Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks.

AM Alajlan - Computers, Materials & Continua, 2022 - cdn.techscience.cn
Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex
over the wireless sensor networks (WSNs). Wormhole attacks are characterized as …

Security concerns and countermeasures in network coding based communication systems: A survey

VN Talooki, R Bassoli, DE Lucani, J Rodriguez… - Computer Networks, 2015 - Elsevier
This survey paper shows the state of the art in security mechanisms, where a deep review of
the current research and the status of this topic is carried out. We start by introducing …