Wormhole attack detection system for IoT network: A hybrid approach
SA Bhosale, SS Sonavane - Wireless Personal Communications, 2022 - Springer
Many errors in data communication cause security attacks in Internet of Things (IoT). Routing
errors at network layer are prominent errors in IoT which degrade the quality of data …
errors at network layer are prominent errors in IoT which degrade the quality of data …
Intrusion detection of wormhole attack in IoT: A review
M Goyal, M Dutta - … Conference on Circuits and Systems in …, 2018 - ieeexplore.ieee.org
Internet of Things is a new paradigm that is rapidly making progress in the present wireless
communications. It semantically implies a worldwide network of connected objects, uniquely …
communications. It semantically implies a worldwide network of connected objects, uniquely …
[PDF][PDF] Energy optimised security against wormhole attack in iot-based wireless sensor networks
An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the
data and share it with the central repositories. These sensors are battery-driven and …
data and share it with the central repositories. These sensors are battery-driven and …
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system
Mobile ad hoc networks (MANETs) are mobile networks, which are automatically outspread
on a geographically limited region, without requiring any preexisting infrastructure. Mostly …
on a geographically limited region, without requiring any preexisting infrastructure. Mostly …
Defending against wormhole attack in MANET using an artificial immune system
MANETs are mobile networks that are spontaneously deployed over a geographically
limited area without requiring any pre-existing infrastructure. Typically, nodes are both …
limited area without requiring any pre-existing infrastructure. Typically, nodes are both …
CREDND: A novel secure neighbor discovery algorithm for wormhole attack
X Luo, Y Chen, M Li, Q Luo, K Xue, S Liu… - IEEE Access, 2019 - ieeexplore.ieee.org
As nodes' characteristics that they are self-governed and resource-limited, wireless sensor
networks (WSNs) face potential threats due to various attacks, among which the most …
networks (WSNs) face potential threats due to various attacks, among which the most …
Defending against wormhole attack in MANET
In the generation of wireless communication, MANET has become an undividable and
acceptable part for communication for mobile equipments. Therefore, interest in research of …
acceptable part for communication for mobile equipments. Therefore, interest in research of …
Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …
that can bypass cryptographic measures and derail the entire communication network. It is …
[PDF][PDF] Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks.
AM Alajlan - Computers, Materials & Continua, 2022 - cdn.techscience.cn
Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex
over the wireless sensor networks (WSNs). Wormhole attacks are characterized as …
over the wireless sensor networks (WSNs). Wormhole attacks are characterized as …
Security concerns and countermeasures in network coding based communication systems: A survey
This survey paper shows the state of the art in security mechanisms, where a deep review of
the current research and the status of this topic is carried out. We start by introducing …
the current research and the status of this topic is carried out. We start by introducing …