2020
DOI: 10.1109/access.2020.2983438
|View full text |Cite
|
Sign up to set email alerts
|

Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks

Abstract: Nodes in wireless sensor networks (WSN) are resource and energy-constrained because they are generally batteries powered and therefore have limited computational capability. Due to the less secure environment in WSN, some malicious nodes at one point can tunnel packets to another location to damage the network in terms of packets dropping and eavesdropping and this is a so-called wormhole attack. Many of the current protocols solve the wormhole attack problem in isolation from the node energy consumption. Howe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
2

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(47 citation statements)
references
References 46 publications
0
45
2
Order By: Relevance
“…In order to evaluate the efficiency of the proposed approach HWAD, we compared its performance with some other well-known wormhole detection approaches in MANET. Such as MCRP algorithm [47] and Aliady and Al-Ahmadi [48] using several network metrics. In the all figures below, the x-axis represents the number of nodes and the y-axis represents the metrics with different network scenarios.…”
Section: Results Comparison and Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to evaluate the efficiency of the proposed approach HWAD, we compared its performance with some other well-known wormhole detection approaches in MANET. Such as MCRP algorithm [47] and Aliady and Al-Ahmadi [48] using several network metrics. In the all figures below, the x-axis represents the number of nodes and the y-axis represents the metrics with different network scenarios.…”
Section: Results Comparison and Evaluationmentioning
confidence: 99%
“…HWAD was able to mitigate the attack while transmission occurs within the same area. [47] for packet delivery ratio with wormhole attack.…”
Section: A Performance Comparison Between Hwad With Aliady Et Al [48mentioning
confidence: 99%
See 1 more Smart Citation
“…Wormhole is another threat to wireless sensors where an attacker introduces dangerous nodes and uses false routes established by the node. Hence, the route from the sensor is set up and the wormhole is detected using a MAC centralized routing protocol (MCRP) [55]. The blockchain methodology suggested in reference [56] is used to keep the communication links in Industry 4.0 secure.…”
Section: Challenges In Wireless Communicationmentioning
confidence: 99%
“…Low-cost hardware has been demonstrated to provide high reliability, excellent support for mobility, and low energy consumption [23]. The sensor nodes have less energy and resource capacity since they are limited by battery [24], and cannot be replaced in various environmental conditions.…”
Section: Related Workmentioning
confidence: 99%