2019
DOI: 10.1109/access.2019.2894637
|View full text |Cite
|
Sign up to set email alerts
|

CREDND: A Novel Secure Neighbor Discovery Algorithm for Wormhole Attack

Abstract: As nodes' characteristics that they are self-governed and resource-limited, wireless sensor networks (WSNs) face potential threats due to various attacks, among which the most threatening attack is wormhole attack. Wormhole attack severely imperils WSNs and is difficult to be detected, for it causes incorrect routing by private tunnels and damages to WSNs in terms of data leakage, data dropping, and delayed delivery. However, the existing solutions are based on additional hardware, incur high communication ove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(43 citation statements)
references
References 47 publications
0
43
0
Order By: Relevance
“…Here, two situations are implemented and looked at. In the first situation, existing strategy that is CREDND [12] for the identification of malevolent is implemented, which likewise utilizes hop distinction and neighborhood checking to spot wormholes. In the proposed outline, the two-phase verification scheme is implemented for the recognition of malevolent nodes in the system, E-CREDND.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Here, two situations are implemented and looked at. In the first situation, existing strategy that is CREDND [12] for the identification of malevolent is implemented, which likewise utilizes hop distinction and neighborhood checking to spot wormholes. In the proposed outline, the two-phase verification scheme is implemented for the recognition of malevolent nodes in the system, E-CREDND.…”
Section: Resultsmentioning
confidence: 99%
“…We propose E-CREDND, a novel calculation for wormhole identification and confinement, which can identify wormholes without extra equipment. We test the correctness of our novel calculation by reenacting and contrasting it and other wormhole identification calculation: CREDND [12], who likewise utilizes hop distinction and neighborhood checking. The results prove that our method outclasses existing method.…”
Section: Eai Endorsed Transactions On Mobile Communications and Applimentioning
confidence: 99%
See 1 more Smart Citation
“…The True-Positive and False-Positive detection rates of the wormhole attack are compared with results obtained by recent research work done by Xiao Luo et al [50]. By considering attacker nodes, 10% of total nodes, the reading for all methods are taken as per Table 4 and Table 5.…”
Section: Performance Analysis Of Implemented System 431 Attack Detementioning
confidence: 99%
“…Generally, WSN is vulnerable to various kinds of threats [9][10][11]. The several attacks in WSN are Sybil attacks, wormhole attacks, black hole attacks, and hello flood attacks [12,13]. The WSN has some security goals such as primary and secondary.…”
Section: Introductionmentioning
confidence: 99%