2022
DOI: 10.32604/cmc.2022.020585
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks

Abstract: Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over the wireless sensor networks (WSNs). Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs. The distributed passive nature of these attacks makes them enormously challenging to detect. The main objective is to find all the possible ways in which how the wireless sensor network's broadcasting character and transmission medium allows the attacker to interrupt network wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…Alajlan, 2022 116 introduces a novel multi-step detection (MSD) technique for WSNs that can efficiently identify wormhole attacks. The MSD uses three techniques to identify and prevent simplex (where two nodes in the network which has tunnels between them but in different places of the network) and duplex (three nodes are in different locations and thus are not one-hop neighbours) wormhole attacks: the neighbour node validation process (NNVP), the fake link reduction process (FLRP), and wormhole separation.…”
Section: Wsn Attack Typesmentioning
confidence: 99%
“…Alajlan, 2022 116 introduces a novel multi-step detection (MSD) technique for WSNs that can efficiently identify wormhole attacks. The MSD uses three techniques to identify and prevent simplex (where two nodes in the network which has tunnels between them but in different places of the network) and duplex (three nodes are in different locations and thus are not one-hop neighbours) wormhole attacks: the neighbour node validation process (NNVP), the fake link reduction process (FLRP), and wormhole separation.…”
Section: Wsn Attack Typesmentioning
confidence: 99%