2018 8th International Conference on Cloud Computing, Data Science &Amp; Engineering (Confluence) 2018
DOI: 10.1109/confluence.2018.8442601
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Prevention Analysis of Wormhole Attack in Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Several detection and prevention methods are explained. In this paper [10], some methods give outstanding performance, and some have a few shortcomings. There are several types of methods and techniques to detect the Sybil attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several detection and prevention methods are explained. In this paper [10], some methods give outstanding performance, and some have a few shortcomings. There are several types of methods and techniques to detect the Sybil attack.…”
Section: Related Workmentioning
confidence: 99%
“…Previous studies [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15] describe Wireless Sensor Networks, Applications of Wireless Sensor Networks, and different types of attacks that occur in the layers of the Wireless Sensor Network and how to detect those attacks using various methods. Different types of methods for detecting wormhole attacks and Sybil attacks that can occur in various types of networks such as Wireless Sensor Networks and Ad hoc Networks are explained [4].…”
Section: Introductionmentioning
confidence: 99%
“…Mohit et al, reviewed different techniques for the detection of wormhole attacks, a significantly dangerous attack affecting the mission of the network [16]. Alomar et al, focused on the security of wormhole detection techniques in WSNs by compromising their energy efficiency [17]. Goyal et al, reviewed schemes for recognizing a wormhole attack in IoT networks [18].…”
Section: Introductionmentioning
confidence: 99%
“…Detection and prevention analysis of wormhole attacks in wireless sensor networks Kumar et al [17] presented a comparative analysis of several techniques, including reputation-based routing, Packet leashes, Beacon nodes, LITEWORP, and algorithms using active nodes. However, the study did not include the strengths and limitations of the existing schemes.…”
mentioning
confidence: 99%
“…Among the above attacks, the wormhole attack is one of the most harmful attacks, changing network topology structure and reducing node positioning accuracy [17] [18]. At present, Distance Vector Hop (DV-Hop) algorithm is one of the leading technologies of node localization.…”
Section: Introductionmentioning
confidence: 99%