Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 6 publications
(2 reference statements)
0
2
0
Order By: Relevance
“…Bogus message during reprogramming [28] Unsecure reprogramming process with bogus messages Sinkhole/blackhole [29][30][31][32] Shortest path, drop the packets External stimuli [33] Use external physical stimuli to create a large number of packets Selective forwarding [3,[34][35][36][37] Selectively drop the packets Homing [33] Hamper the normal functioning of cluster heads The node replication [38,39] Add extra node to the network with the same cryptographic secrets Neglect and greed [40] Deny transmission of legitimate packets and give higher priority to own packets HELLO flood [41] Flood with HELLO packets Unfairness [40] Unfair resource allocation on MAC protocols Wormhole [42][43][44][45] Offer less number of hops and less delay, which is fake Sybil [36,[46][47][48] A malicious node pretends to be more than one node…”
Section: Wsn Security Viewing Anglementioning
confidence: 99%
“…Bogus message during reprogramming [28] Unsecure reprogramming process with bogus messages Sinkhole/blackhole [29][30][31][32] Shortest path, drop the packets External stimuli [33] Use external physical stimuli to create a large number of packets Selective forwarding [3,[34][35][36][37] Selectively drop the packets Homing [33] Hamper the normal functioning of cluster heads The node replication [38,39] Add extra node to the network with the same cryptographic secrets Neglect and greed [40] Deny transmission of legitimate packets and give higher priority to own packets HELLO flood [41] Flood with HELLO packets Unfairness [40] Unfair resource allocation on MAC protocols Wormhole [42][43][44][45] Offer less number of hops and less delay, which is fake Sybil [36,[46][47][48] A malicious node pretends to be more than one node…”
Section: Wsn Security Viewing Anglementioning
confidence: 99%
“…As a result, the packets will then be dropped, spoofed, or altered. This attack can be detected by computing the RSSI. Wormholes : According to the work undertaken by the authors in , wormhole attacks are classified into passive or active attacks. In our research, we focus on active wormholes.…”
Section: Background and Related Workmentioning
confidence: 99%