Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks
Traditional routing protocols are quite vulnerable under the attacks from both external and internal attackers. In this work, we examine the impact of a wide variety of attacks in malicious wireless sensor networks scenario.
Chen Lyu +4 more
doaj +1 more source
Mobile Ad-hoc Network (MANET) is one of the important research areas. MANET is a cluster of movable nodes that communicate without any wired connection.
Akansha Shrivastava, Ekta Chauhan
doaj
Wormhole Attack Mitigation in Wireless Network Using Propagation Delay
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to ...
Harry May, Travis Atkison
doaj
Real-Time Detection and Response to Wormhole and Sinkhole Attacks in Wireless Sensor Networks
Wireless sensor networks have become a vital technology that is extensively applied across multiple industries, including agriculture, industrial operations, and smart cities, as well as residential smart homes and environmental monitoring systems ...
Tamara Zhukabayeva +5 more
doaj +1 more source
DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks
Data transmission in a mobile ad hoc network is performed within an untrusted wireless environment. It is subjected to many kinds of security attacks. In a wormhole attack, two malicious nodes work together to tunnel packets from one to the other, making
Hon Sun Chiu +2 more
doaj
Leveraging Propagation Delay for Wormhole Detection in Wireless Networks
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity.
Harry May, Travis Atkison
doaj
Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks. [PDF]
Kumar M +5 more
europepmc +1 more source
ABCD: advanced blockchain DSR algorithm for MANET to mitigate the different security threats
Mobile ad hoc networks (MANETs) facilitate data communication across multiple nodes and hop stations, characterized by their dynamic topology. This inherent flexibility, however, makes MANETs vulnerable to various security threats, notably blackhole and ...
Sayan Majumder +2 more
doaj +1 more source
Distributed Wormhole Attack Mitigation Technique in WSNs [PDF]
Sharada Kori +2 more
openaire +1 more source
Wormhole Detection Algorithm: To Detect Wormhole Attacks Efficiently in Wireless Networks
R. Regan +3 more
openaire +1 more source

