2009 Eighth IEEE International Symposium on Network Computing and Applications 2009
DOI: 10.1109/nca.2009.10
|View full text |Cite
|
Sign up to set email alerts
|

Digital Investigation of Wormhole Attacks in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…Wormhole Attack [18], [19] -In this critical attack, the attacker saves the packets in a network address and the tunnels in another. -It is a significant threat, because it can occur at the beginning, when the sensor nodes are just finding out about the neighboring sensors.…”
Section: Security Methods For the Wireless Sensor Networkmentioning
confidence: 99%
“…Wormhole Attack [18], [19] -In this critical attack, the attacker saves the packets in a network address and the tunnels in another. -It is a significant threat, because it can occur at the beginning, when the sensor nodes are just finding out about the neighboring sensors.…”
Section: Security Methods For the Wireless Sensor Networkmentioning
confidence: 99%
“…Note that the first column in the table shows some important factors which make WNSs environments unique and different from WLAN. In another work, (Triki et al, 2009) propose a solution to digital forensics investigations when wormhole attacks take place in a WSN. This solution ultimately aims to collect digital evidence, detect colluded nodes and reconstruct the events which occurred during the wormhole attack which allows attackers to transmit a packet from one point to another point in the network by creating 'tunnels' (see Fig.…”
Section: Network Level Investigationmentioning
confidence: 99%
“…As presented in [40], an observation network that is virtually separate WSN is forms through observer nodes and base stations. The observers and the BS uses different frequency band than the sensor nodes.…”
Section: ) Digital Investigation-based Approachmentioning
confidence: 99%