2016
DOI: 10.1007/s11276-016-1240-0
|View full text |Cite
|
Sign up to set email alerts
|

Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…Authors in [30]- [32] presented useful solutions that use neighboring approach, however, their wormhole detection methods are not comprehensive and hard to implement. Another solution presented in [33] depends on the neighboring approach and requires extravagant overhead that likely results in several traffic problems such as congestion. Also, another mechanism suggested a solution in [34] to utilize a combination of energy, routes traffic rate, number of nodes and nodes trust to select the optimum path avoiding wormhole attackers; however, this algorithm would add overhead to the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Authors in [30]- [32] presented useful solutions that use neighboring approach, however, their wormhole detection methods are not comprehensive and hard to implement. Another solution presented in [33] depends on the neighboring approach and requires extravagant overhead that likely results in several traffic problems such as congestion. Also, another mechanism suggested a solution in [34] to utilize a combination of energy, routes traffic rate, number of nodes and nodes trust to select the optimum path avoiding wormhole attackers; however, this algorithm would add overhead to the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [53], the authors have proposed a monitoring technique for wormhole-free routing and DoS attack defense in wireless mesh networks. In the beginning, all nodes keep track of their neighbors' receivers and senders' information based on the finite state model.…”
Section: Background Studymentioning
confidence: 99%
“…Lu et al [39] proposed the method that first attempt toward creating a graph theoretical approach, called Worm Planar, who just utilizes localized connectivity information and is capable of capturing the global require symptoms of wormholes directly in the wireless networks. Akilarasu and Shalinie [40] showed an approach for wormhole detection based on Finite State Machine (FSM) and priority mechanism. Jamali and Fotohi [41] proposed an improvement over AODV routing protocol called defending against wormhole attack (DAWA) employs the fuzzy logic system and artificial immune system to defend against wormhole attacks.…”
Section: Connectivity-based Approachmentioning
confidence: 99%