2022
DOI: 10.1109/access.2021.3140038
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Holes Problem in Wireless Underground Sensor Networks

Abstract: The paper aims to put in the forefront a survey on the existing holes problem in the Wireless Underground Sensor Networks (WUSNs). Anomalies in wireless sensor networks can weaken the network by impeding their functionalities. These existing anomalies commonly known as holes may cause irreversible devastating problems and may prove fatal to humans. There can be a different kind of holes in the network such as coverage hole, routing hole, jamming hole, and sink/ worm hole, etc. This paper intends to discuss in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 105 publications
(111 reference statements)
0
3
0
Order By: Relevance
“…2 shows the paper selection mechanism regarding the targeted domain. • Background and statistics (15) [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16] • Similarities of WSN And IoT (1) [17] • Issues In WSN and IoT frameworks (11) [18][19][20][21][22][23][24][25][26][27][28][29][30][31] • Network security attacks in IoT and WSNs (7) [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47] • Issues of data link layer [48][49][50]…”
Section: Q3 What Are Common Attacks In Data Link Layer?mentioning
confidence: 99%
See 2 more Smart Citations
“…2 shows the paper selection mechanism regarding the targeted domain. • Background and statistics (15) [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16] • Similarities of WSN And IoT (1) [17] • Issues In WSN and IoT frameworks (11) [18][19][20][21][22][23][24][25][26][27][28][29][30][31] • Network security attacks in IoT and WSNs (7) [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47] • Issues of data link layer [48][49][50]…”
Section: Q3 What Are Common Attacks In Data Link Layer?mentioning
confidence: 99%
“…Furthermore, it is frequently utilized to carry out novel assaults such as specific sending ambushes, perception satirizing strikes, left or changed directing data, and a hostile node generates forged guiding data. It poses as a genuine node for the course [40][41][42][43][44].…”
Section: Sink Hole Attackmentioning
confidence: 99%
See 1 more Smart Citation