2014
DOI: 10.1016/j.procs.2014.05.319
|View full text |Cite
|
Sign up to set email alerts
|

Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…Sina Shahabi et al [6] suggested a new algorithm which enhances the security of AODV routing protocol to encounter the black hole attacks. This algorithm tries to identify malicious nodes according to nodes' behaviours in an Ad Hoc network and delete them from routing Fang-Jiao Zhanga B et al [7] the main contribution is to propose a new Sinkhole detection algorithm based the multi-path selection. The simulation also proves the feasibility of the approach.…”
Section: Related Workmentioning
confidence: 99%
“…Sina Shahabi et al [6] suggested a new algorithm which enhances the security of AODV routing protocol to encounter the black hole attacks. This algorithm tries to identify malicious nodes according to nodes' behaviours in an Ad Hoc network and delete them from routing Fang-Jiao Zhanga B et al [7] the main contribution is to propose a new Sinkhole detection algorithm based the multi-path selection. The simulation also proves the feasibility of the approach.…”
Section: Related Workmentioning
confidence: 99%
“…The distributed hyperspherical cluster‐based scheme has better detection accuracy with less communication overhead as compared with the centralized scheme in which all sensor nodes communicate to a central node for processing. Zhang et al proposed a redundancy mechanism to prevent sinkhole attack. In this technique, messages are sent to the suspicious nodes through multiple paths.…”
Section: Literature Surveymentioning
confidence: 99%
“…In this section, we compare the performance of our scheme with other related existing schemes, such as Salehi et al 's scheme , Wang et al 's scheme , Hamedheidari et al 's scheme , Krontiris et al 's scheme , Shafieil et al 's scheme , Zhang et al 's scheme , Wang et al 's scheme and Wang et al 's scheme . From the results provided in Table , it is evident that our scheme has significantly better performance as compared with that for other existing schemes.…”
Section: Performance Comparison With Existing Related Schemesmentioning
confidence: 99%
“…Fang-Jiao Zhang et al [6] proposed a redundancy mechanism to detect the sinkhole attack in a network. In case, if there is any suspicious node in the network, messages are sent to them through multi-paths.…”
Section: Related Workmentioning
confidence: 99%