2021
DOI: 10.21203/rs.3.rs-252135/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Wormhole Attack Detection System for IoT Network: A Hybrid Approach

Abstract: Many errors in data communication cause security attacks in Internet of Things (IoT). Routing errors which are prominent errors in IoT, degrade the quality of data communication. Many attacks like sinkhole attack, blackhole attack, selective forwarding attack and wormhole attack enter the network through network layer of the IoT. This paper has an emphasis on the wormhole attack detection because it is one of the most uncompromising attacks at the network layer of IoT protocol stack. The wormhole attack insert… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…The wormholes are addressed, and the source node uses the particle swarm optimization (PSO) method to find an optimal path among the safe paths. 52 In Bhosale and Sonavane, 55 the wormhole is detected baed on the location of any node along with its neighbor information which can be obtained by using the received signal strength indicator (RSSI) and hop count. The ESWI algorithm detects suspicious nodes using transmission-time information.…”
Section: Neighborhood Information-based Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…The wormholes are addressed, and the source node uses the particle swarm optimization (PSO) method to find an optimal path among the safe paths. 52 In Bhosale and Sonavane, 55 the wormhole is detected baed on the location of any node along with its neighbor information which can be obtained by using the received signal strength indicator (RSSI) and hop count. The ESWI algorithm detects suspicious nodes using transmission-time information.…”
Section: Neighborhood Information-based Techniquesmentioning
confidence: 99%
“…In Bhosale and Sonavane, 55 the wormhole is detected baed on the location of any node along with its neighbor information which can be obtained by using the received signal strength indicator (RSSI) and hop count. The ESWI algorithm detects suspicious nodes using transmission‐time information.…”
Section: Wormhole Mitigation Schemesmentioning
confidence: 99%