WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks

R Singh, J Singh, R Singh - Mobile Information Systems, 2016 - Wiley Online Library
Wormhole attack is a challenging security threat to wireless sensor networks which results in
disrupting most of the routing protocols as this attack can be triggered in different modes. In …

M‐LionWhale: multi‐objective optimisation model for secure routing in mobile ad‐hoc network

RM Chintalapalli, VR Ananthula - IET Communications, 2018 - Wiley Online Library
Mobile ad‐hoc network (MANET) is an emerging technology that comes under the category
of wireless network. Even though the network assumes that all its mobile nodes are trusted …

A detection and prevention system against collaborative attacks in mobile ad hoc networks

FA Khan, M Imran, H Abbas, MH Durad - Future Generation Computer …, 2017 - Elsevier
Abstract Mobile Ad hoc Networks (MANETs) are vulnerable to various kinds of threats due to
their dynamic nature and lack of a central point of control. Collaborative attacks occur when …

A comprehensive review on detection of wormhole attack in MANET

SK Jangir, N Hemrajani - … on ICT in Business Industry & …, 2016 - ieeexplore.ieee.org
As MANETs use wireless medium for Communication, these are susceptible to many
security attacks. In this paper a methodical review is done on the recent state of the research …

A wormhole attack detection and prevention technique in wireless sensor networks

A Siddiqui, A Karami… - International Journal of …, 2017 - repository.uel.ac.uk
Security is one of the major and important issues surrounding network sensors because of
its inherent liabilities, ie physical size. Since network sensors have no routers, all nodes …

Trust system-and multiple verification technique-based method for detecting wormhole attacks in MANETs

J Ryu, S Kim - IEEE Access, 2024 - ieeexplore.ieee.org
The proliferation of wireless mobile devices has resulted in mobile ad hoc network (MANET)
technologies, which enable the formation of networks without infrastructure assistance …

Scalable and distributed detection analysis on wormhole links in wireless sensor networks for networked systems

J Padmanabhan, V Manickavasagam - IEEE Access, 2017 - ieeexplore.ieee.org
Recent surge in cyber physical systems (CPSs) which integrate cyber and physical worlds,
increases security risks at both the surfaces. The wireless sensor communication network is …

Isolation of Wormhole Attackers in IOV Using WPWP Packet.

SS Kanumalli, A Chinta… - Revue d'Intelligence …, 2019 - search.ebscohost.com
IOV is a unique form of VANETS network with a special kind of remote system which is
arranged with set of versatile vehicles that can be effortlessly included and expelled from the …

T-whale: Trust and whale optimization model for secure routing in mobile ad-hoc network

CR Mohan, AV Reddy - … Journal of Artificial Life Research (IJALR), 2018 - igi-global.com
One of the infrastructureless networks built by various independent mobile nodes is mobile
ad hoc network (MANET), which is an emerging technology, requiring a secure routing …

Wormhole attack in mobile ad-hoc network: a survey

A Shrivastava, R Dubey - International Journal of Security and Its …, 2015 - earticle.net
Security is the one of the major issue that exists in Mobile Ad hoc network. Mobile Ad hoc
network is infrastructure less network so it is vulnerable to several security attacks that are …