Proceedings of the International Conference on Internet of Things and Cloud Computing 2016
DOI: 10.1145/2896387.2900330
|View full text |Cite
|
Sign up to set email alerts
|

Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…In a wormhole attack [10], an attacker receives packets at one location in the network, tunnels them to a remote location in the network, and then replays them into the network from that location. A wormhole attack can be easily executed against routing in sensor networks because it does not need to physically compromise any sensor node.…”
Section: Introductionmentioning
confidence: 99%
“…In a wormhole attack [10], an attacker receives packets at one location in the network, tunnels them to a remote location in the network, and then replays them into the network from that location. A wormhole attack can be easily executed against routing in sensor networks because it does not need to physically compromise any sensor node.…”
Section: Introductionmentioning
confidence: 99%
“…False Report Injection attacks can exhaust all the energy of the all nodes in repetitive attacks. This problem reduces the networks lifetime or disables the networks [10][11][12]. In addition, The BS informs the user of the wrong information and causes confusion and time loss.…”
Section: Introductionmentioning
confidence: 99%
“…A wormhole is a tunnel which connects two remote nodes. In a wormhole attack [16], an attacker receives packets at one location in the network, tunnels them to a remote location in the network, and then replays them into the network from that location. A wormhole attack can be easily executed against routing in sensor networks because it does not need to physically compromise any sensor node.…”
Section: Introductionmentioning
confidence: 99%