2024
DOI: 10.1038/s41598-024-53938-9
|View full text |Cite
|
Sign up to set email alerts
|

Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

David Samuel Bhatti,
Shahzad Saleem,
Azhar Imran
et al.

Abstract: The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographic measures and derail the entire communication network. It is too difficult to prevent a priori; all the possible countermeasures are either too expensive or ineffective. Indeed, literature solutions either require expensive hardware (typically UWB or secure GPS transceivers) or pose specific constraints to the adversarial behavior (doing or not doing a suspicious action). The proposed solution… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 66 publications
0
0
0
Order By: Relevance