3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011) 2011
DOI: 10.1049/ic.2011.0042
|View full text |Cite
|
Sign up to set email alerts
|

Detection of wormhole attacks in wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Both mechanisms use lightweight hash chains to authenticate the nodes [9]. The Message Authentication Code (MAC) can be calculated in real time.…”
Section: Location Information Based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Both mechanisms use lightweight hash chains to authenticate the nodes [9]. The Message Authentication Code (MAC) can be calculated in real time.…”
Section: Location Information Based Methodsmentioning
confidence: 99%
“…Wormhole attack is a type of Denial of Service attack that misleads routing operations even without the knowledge of the encryptions methods unlike other kinds of attacks. This characteristic makes it very important to identify and to defend against it [9].…”
Section: Background and Significance Of Wormhole Attackmentioning
confidence: 99%
“…In Temporal Leashes, each hub keeps up a firmly synchronized clock however doesn't rely upon GPS data [2]. The two components use lightweight hash chains to confirm the hubs [3]. The Message Authentication Code can be resolved continuously.…”
Section: Writing Surveymentioning
confidence: 99%
“…These two uses hash chains that compute lightweight operations for validating nodes [3]. Because of these additions the computation overhead is low.…”
Section: Literature Surveymentioning
confidence: 99%