2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS) 2014
DOI: 10.1109/padsw.2014.7097858
|View full text |Cite
|
Sign up to set email alerts
|

Real-time and passive wormhole detection for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Luo et al [75] presented a real-time and passive wormhole detection method, named Pworm, which can detect and locate malicious nodes in a stationary network based on the insight that the path length would reduce and the traffic flow would increase around wormhole nodes. This method runs in a stationary network to trace malicious nodes.…”
Section: Wormhole Attack (Wa)mentioning
confidence: 99%
“…Luo et al [75] presented a real-time and passive wormhole detection method, named Pworm, which can detect and locate malicious nodes in a stationary network based on the insight that the path length would reduce and the traffic flow would increase around wormhole nodes. This method runs in a stationary network to trace malicious nodes.…”
Section: Wormhole Attack (Wa)mentioning
confidence: 99%
“…A malicious attacker may also use wormhole attacks and Sybil attacks to disable networks by creating fake network resources [ 9 ]. The increase in security attacks such as single point failure, wormhole attacks [ 10 ], and Sybil attacks [ 11 ] makes optical networks insecure and unreliable [ 1 ], and can cause huge data and revenue losses [ 2 ]. Hence, securing optical networks against various attacks is paramount.…”
Section: Introductionmentioning
confidence: 99%
“…Next, let us understand other limitations of existing algorithms for handling colluders. Typically, these algorithms assume the existence of trusted third parties (e.g., a trusted base station, such as in [ 20 ]). This is problematic for several reasons.…”
Section: Introductionmentioning
confidence: 99%