2019
DOI: 10.1109/access.2019.2924283
|View full text |Cite
|
Sign up to set email alerts
|

Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks

Abstract: A wireless sensor network consists of sensors having autonomous wireless communication with the ability to sense their surrounding conditions and an ability to connect to the Internet through a base station. In most cases, sensors are spatially distributed and, hence, must have a low cost; for this reason, they have limited batteries, computational ability, and memory size. Sensors' restrained ability to implement common security measures makes them vulnerable to various types of attacks. Moreover, their appli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 26 publications
0
20
0
Order By: Relevance
“…These protocols include as follows: Adhoc On-Demand Distance Vector (AODV) [40], Optimized Link State Routing (OLSR) [41] and Destination-Sequenced Distance-Vector Routing (DSDV) [42]. In [43], it was proposed a secured AODV (SAODV) to detect a wormhole attack. This protocol reduces the energy consumption slightly compared to the original AODV at the expense of the time delay and throughput.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These protocols include as follows: Adhoc On-Demand Distance Vector (AODV) [40], Optimized Link State Routing (OLSR) [41] and Destination-Sequenced Distance-Vector Routing (DSDV) [42]. In [43], it was proposed a secured AODV (SAODV) to detect a wormhole attack. This protocol reduces the energy consumption slightly compared to the original AODV at the expense of the time delay and throughput.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Energy preserving secure measure has proposed by Aliady et al [6] to detect wormhole attack. This measure is based on the network connectivity and applied to the ad-hoc-on-demand distance vector routing protocol.…”
Section: Related Workmentioning
confidence: 99%
“…The study is more focused on physical layer security. Another study where energy is associated with the security in wireless network is carried out by Iliad and Al-Ahmadi [13]. The study has focused on the problem associated with wormhole attack where the solution is presented on the basis of using an on-demand routing scheme developed over network simulator.…”
Section: Related Workmentioning
confidence: 99%