Analysis of secure LEACH-based clustering protocols in wireless sensor networks

M Masdari, SM Bazarchi, M Bidaki - Journal of Network and Computer …, 2013 - Elsevier
LEACH or Low-Energy Adaptive Clustering Hierarchy is a successful clustering-based
routing protocol that recently has attracted a lot of attention in literature. However, this …

[PDF][PDF] A literature survey on security issues of WSN and different types of attacks in network

M Pawar, J Agarwal - Indian J. Comput. Sci. Eng, 2017 - ijcse.com
This review work present a gist of security issues related to the WSN network and discusses
different types of attacks in the network. Sensor nodes, when deployed to form a network of …

Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM

MV Pawar - International Journal of Pervasive Computing and …, 2023 - emerald.com
Purpose This study aims to present a novel system for detection and prevention of black
hole and wormhole attacks in wireless sensor network (WSN) based on deep learning …

Sensor networks attacks classifications and mitigation

ASA Daia, RA Ramadan, MB Fayek… - Annals of emerging …, 2018 - papers.ssrn.com
Abstract Wireless Sensor Networks (WSNs) are exposed to many security attacks, and it can
be easily compromised. One of the main reasons for these vulnerabilities is the deployment …

[PDF][PDF] International journal of advanced research in computer science and software engineering

AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …

Analysis of LEACH routing protocol in wireless sensor network with wormhole attack

KP Sampoornam, S Saranya… - … and Virtual Mobile …, 2021 - ieeexplore.ieee.org
Unique features such as limited battery power, dynamic topology, and restricted bandwidth
make the Wireless Sensor Network (WSN) susceptible to a lot of types of attacks. The …

Performance evaluation of a wormhole detection method using round-trip times and hop counts in RPL-based 6LoWPAN networks

C Samuel, BM Alvarez, EG Ribera… - … Networks and Digital …, 2020 - ieeexplore.ieee.org
The IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) has been
standardized to support IP over lossy networks. RPL (Routing Protocol for Low-Power and …

Wormhole and Sybil attack in WSN: a review

S Goyal, T Bhatia, AK Verma - 2015 2nd international …, 2015 - ieeexplore.ieee.org
With the increasing popularity of mobile devices, recent developments in wireless
communication and the deployment of wireless sensor networks in the hostile environment …

[PDF][PDF] A review of attacks and security protocols for wireless sensor networks

F Sun, Z Zhao, Z Fang, L Du, Z Xu, D Chen - Journal of Networks, 2014 - researchgate.net
With the development of the wireless communication technology and the improvement of the
performance of the MEMS sensor, wireless sensor networks are widely used in various …

Reliability improvement of multi-path routing for wireless sensor networks and its application to wormhole attack avoidance

M Arai - 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence …, 2015 - ieeexplore.ieee.org
Wireless sensor networks have recently been widely studied and applied in long-term
mission-critical environments, where reliable delivery of sensing information under multiple …