2022
DOI: 10.1002/dac.5311
|View full text |Cite
|
Sign up to set email alerts
|

Wormhole attack mitigation strategies and their impact on wireless sensor network performance: A literature survey

Abstract: Summary Wireless sensor networks (WSNs) consist of hundreds of small sensors that collect and report data. During data sharing, these WSNs become vulnerable to numerous security threats, including the deadly ones. Mitigating this risk is a real challenge, especially in a low‐resource environment such as a WSN. In this work, using a systematic literature review, we surveyed a large body of research (28 studies) that focused on mitigating wormhole security attacks. Through this study, we evaluate the impact of m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 80 publications
0
6
0
Order By: Relevance
“…In this document, ESPAR antennas are designed and configured such that the distance between each antenna is 0.5λ, and the distinction among active and parasitic element is λ/4. 19,20 The proposed 2 Â 2 array antenna's gain (9.61 dBi) is much higher than the previously published array antennas like 9.04 21 and 9.50 dBi. 22 As compared to the other features, reflection coefficient, radiation pattern, and directivity are also investigated with well-designed antennas.…”
mentioning
confidence: 74%
See 2 more Smart Citations
“…In this document, ESPAR antennas are designed and configured such that the distance between each antenna is 0.5λ, and the distinction among active and parasitic element is λ/4. 19,20 The proposed 2 Â 2 array antenna's gain (9.61 dBi) is much higher than the previously published array antennas like 9.04 21 and 9.50 dBi. 22 As compared to the other features, reflection coefficient, radiation pattern, and directivity are also investigated with well-designed antennas.…”
mentioning
confidence: 74%
“…As its structure is static, it builds the next beam followed by the previous beam by shifting periodically. Reiterating this process M times, M beams can produce M‐beam patterns such that it achieves the maximum beam pattern at an angle of 20,21 0.25emθmgoodbreak=2π()mgoodbreak−1M;0.5emfor0.25emnormalmgoodbreak=1,2,3,,normalM. …”
Section: Espar/array Antenna Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, this research used the linked data attributes that have a long value, e.g., "dbo: abstract", as training data for neural network models, and, we extracted from them the valuable concepts for QE. In our exploration of a query reformulation approach using a domainspecific ontology, our research draws upon foundational insights presented in [19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34].…”
Section: Query Reformulation Approaches Using Domain-specific Ontologiesmentioning
confidence: 99%
“…Wormhole can bypass cryptographic measures, so the techniques based on complex computing functions are less welcomed in low-resource scenarios of ad hoc networks. That's why devising solutions for these scenarios is one of the critical challenges 23 .…”
Section: Introductionmentioning
confidence: 99%