2022
DOI: 10.1109/jsen.2022.3152841
|View full text |Cite
|
Sign up to set email alerts
|

A Wormhole Attack Detection Algorithm Integrated With the Node Trust Optimization Model in WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 30 publications
0
13
0
Order By: Relevance
“…Wormhole-In a Wormhole attack, the adversary strategically places two malicious nodes in the network, establishing a dedicated low-latency channel between them. This channel facilitates deceptive communication, causing nodes within range of one malicious node to inaccurately perceive the proximity of the other node as well, as if they were only one hop away [120]. In DV-Hop-based localization, this attack causes significant damage, leading the scientific community in this area to analyze and propose mitigation solutions.…”
Section: Authenticitymentioning
confidence: 99%
“…Wormhole-In a Wormhole attack, the adversary strategically places two malicious nodes in the network, establishing a dedicated low-latency channel between them. This channel facilitates deceptive communication, causing nodes within range of one malicious node to inaccurately perceive the proximity of the other node as well, as if they were only one hop away [120]. In DV-Hop-based localization, this attack causes significant damage, leading the scientific community in this area to analyze and propose mitigation solutions.…”
Section: Authenticitymentioning
confidence: 99%
“…The existing trust management schemes [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]44,45,51,52 failed to fulfill the most fundamental requirement for industrial WSN (ICN). Finally, after sincerely analyzing existing work, we can say that without considering indirect (feedback or reputation) trust, frequency of misbehavior, current, and past misbehavior, a malicious node might disguise the network to ruin its reputation 38 and remain not detected as well as trustworthy [46][47][48][49][50] .…”
Section: Literature Reviewmentioning
confidence: 99%
“…Teng et al [46] present a wormhole attack detection algorithm related to the node trust optimization model against wormholes in wireless sensor networks (WSNs). The proposed method owns a high detection rate and a low false-positive rate for networks with high node density and high vulnerability, which ensures the safety and reliability of the WSNs.…”
Section: Jamming Noisementioning
confidence: 99%