2021
DOI: 10.1155/2021/5143124
|View full text |Cite|
|
Sign up to set email alerts
|

[Retracted] Self‐Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN

Abstract: Internet network communication protocol version 6 low-power wireless personal area networks (6LoWPAN) is supposed to assist the gadgets with low-power wireless sensor network (WSN) and it furnishes the top model layer of the data transmission system. The 6LoWPAN is prone to the diversified attacks such as wormhole and black hole attacks, which might be very difficult to become aware of and defend. In a wormhole attack, the attacker listens to the facts over the networks, and in a black hole attack, the intrude… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…al. 47 proposed a self-adaptive framework for the detection and isolation of wormhole and black-hole attacks in 6 Low-power Wireless Personal Area Networks (6LoWPAN). They used to send dummy RREQ packets for filtering out the shortest route (2-3 hops) and finding the average route (4-5 hops).…”
Section: Related Workmentioning
confidence: 99%
“…al. 47 proposed a self-adaptive framework for the detection and isolation of wormhole and black-hole attacks in 6 Low-power Wireless Personal Area Networks (6LoWPAN). They used to send dummy RREQ packets for filtering out the shortest route (2-3 hops) and finding the average route (4-5 hops).…”
Section: Related Workmentioning
confidence: 99%
“…al. 26 proposed a self-adaptive framework for the detection and isolation of wormhole and black-hole attacks in 6 Low-power Wireless Personal Area Networks (6LoWPAN). They used to send dummy RREQ packets for filtering out the shortest route (2-3 hops) and finding the average route (4-5 hops).…”
Section: Related Workmentioning
confidence: 99%
“…al. 26 rank based approach, does not require extra hardware may miss low or normal range wormholes Shukla et. al.…”
Section: Conclusion Of the Literature Reviewmentioning
confidence: 99%
“…It is suitable for low bandwidths, different topologies, low-cost, scalable networks, etc. It is based on IP protocol and it is efficient for IP networks [17].…”
Section: Lowpanmentioning
confidence: 99%