2019
DOI: 10.1007/s11277-019-06160-0
|View full text |Cite
|
Sign up to set email alerts
|

Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 42 publications
0
15
0
Order By: Relevance
“…In Worm hole attack, an attacker is listening secretly and behaves like a normal node, and at a certain point in time, it collects data and can leave the network. In most cases, all colluding nodes operate cooperatively and openly in a network [15].…”
Section: Worm Hole Attackmentioning
confidence: 99%
“…In Worm hole attack, an attacker is listening secretly and behaves like a normal node, and at a certain point in time, it collects data and can leave the network. In most cases, all colluding nodes operate cooperatively and openly in a network [15].…”
Section: Worm Hole Attackmentioning
confidence: 99%
“…The pre-distribution key mechanism provides a suitable balance between storage load and processing ability, which is regarded as the most appropriate mechanism for WSNs [21]. Many key management protocols had proposed, such as [22]- [24].…”
Section: Key Management Schemementioning
confidence: 99%
“…Limited availability of resources dispenses Ad-hoc network to attacks. An unauthorized entity with high power supply, memory, and computational capability is successful in introducing malicious attacks over MANET's [6].…”
Section: B Impact Of Wormhole Attackmentioning
confidence: 99%