2012
DOI: 10.1007/978-3-642-31513-8_36
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…The two algorithms rely on historical records, thus they are unreliable over a long time. In [20], a centralized method based on geographic location is proposed for detecting Sybil attacks in mobile sensor networks including three phases of clustering, selecting nodes nearby Sybil nodes, and routing procedures. Obviously, the method is not proper.…”
Section: Methods In Mobile Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…The two algorithms rely on historical records, thus they are unreliable over a long time. In [20], a centralized method based on geographic location is proposed for detecting Sybil attacks in mobile sensor networks including three phases of clustering, selecting nodes nearby Sybil nodes, and routing procedures. Obviously, the method is not proper.…”
Section: Methods In Mobile Iotmentioning
confidence: 99%
“…In [13,14,18,19,20,21,22,23,24,25], algorithms are proposed to detect Sybil attacks in mobile IoT. Work [13] proposed two Sybil attack detection methods called PASID and PASID-GD based on observer monitoring.…”
Section: Methods In Mobile Iotmentioning
confidence: 99%
“…By all the number of benefits that has been provided by the architecture [3,17,19] and therefore SDN has concerned important benefits from industry as well as academic community. The authors [10,11,13] introduced a set of routing attacks in wireless sensor networks and secured routing in [9,12,14] using TESLA based certificates for wireless sensor networks (WSN). The rest of this paper is organized as follows.…”
Section: Software Defined Network (Sdn)mentioning
confidence: 99%
“…There are basically two types of attacks in sensor network e.g. active and passive attacks [2]. The malicious nodes can enhance their attacking capabilities by intruding the private information from mobile codes as well as by accessing the information pertaining to the positioning of the nodes [3].…”
Section: Introductionmentioning
confidence: 99%