2017
DOI: 10.1007/978-3-319-64701-2_30
|View full text |Cite
|
Sign up to set email alerts
|

Defenses Against Wormhole Attacks in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…When the wormhole tunnel is implemented, the attacker captures the packets directed by the nodes on one side of the network and spreads them through the wormhole tunnel on the other side. The wormhole nodes behave completely transparently, making them invisible to the network; therefore, it is operational even without network IDs or cryptographic keys ( Ma et al, 2017 ). Table 1 displays the comparative analysis of currently available wormhole attack detections in literature.…”
Section: Introductionmentioning
confidence: 99%
“…When the wormhole tunnel is implemented, the attacker captures the packets directed by the nodes on one side of the network and spreads them through the wormhole tunnel on the other side. The wormhole nodes behave completely transparently, making them invisible to the network; therefore, it is operational even without network IDs or cryptographic keys ( Ma et al, 2017 ). Table 1 displays the comparative analysis of currently available wormhole attack detections in literature.…”
Section: Introductionmentioning
confidence: 99%