AI-based wormhole attack detection techniques in wireless sensor networks

M Hanif, H Ashraf, Z Jalil, NZ Jhanjhi, M Humayun… - Electronics, 2022 - mdpi.com
The popularity of wireless sensor networks for establishing different communication systems
is increasing daily. A wireless network consists of sensors prone to various security threats …

A survey on the current security landscape of intelligent transportation systems

A Lamssaggad, N Benamar, AS Hafid, M Msahli - IEEE Access, 2021 - ieeexplore.ieee.org
With the proliferation of embedded technologies and wireless capabilities, today's vehicles
are no longer isolated mechanical machines. They become part of a hyper-connected …

Wormhole attack detection system for IoT network: A hybrid approach

SA Bhosale, SS Sonavane - Wireless Personal Communications, 2022 - Springer
Many errors in data communication cause security attacks in Internet of Things (IoT). Routing
errors at network layer are prominent errors in IoT which degrade the quality of data …

Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection

M Prasad, S Tripathi, K Dahal - Computers & Security, 2020 - Elsevier
The massive growth of data in the network leads to attacks or intrusions. An intrusion
detection system detects intrusions from high volume datasets but increases complexities. A …

CREDND: A novel secure neighbor discovery algorithm for wormhole attack

X Luo, Y Chen, M Li, Q Luo, K Xue, S Liu… - IEEE Access, 2019 - ieeexplore.ieee.org
As nodes' characteristics that they are self-governed and resource-limited, wireless sensor
networks (WSNs) face potential threats due to various attacks, among which the most …

Review of the techniques against the wormhole attacks on wireless sensor networks

G Farjamnia, Y Gasimov, C Kazimov - Wireless Personal Communications, 2019 - Springer
With the advancement of technology, the application of Wireless Sensor Networks (WSNs)
has increased in various fields, such as; military, medical and business. WSNs have the …

[PDF][PDF] A review: secure routing protocols for mobile adhoc networks (MANETs)

S Kalime, K Sagar - Journal of Critical Reviews, 2021 - researchgate.net
Mobile Ad-hoc Network is a multi-hop wireless networking of mobile nodes that have
restricted resources by the conditions of battery life, memory, and processing power. The …

Honeyboost: Boosting honeypot performance with data fusion and anomaly detection

S Kandanaarachchi, H Ochiai, A Rao - Expert Systems with Applications, 2022 - Elsevier
With insider attacks becoming more common and costing organizations more every year, it
has never been more crucial to be able to predict when an insider attack may happen …

FSSAM: A Five Stage Security Analysis Model for Detecting and Preventing Wormhole Attack in Mobile Ad-Hoc Networks Using Adaptive Atom Search Algorithm

D Hemanand, NS Ram, DS Jayalakshmi - Wireless Personal …, 2023 - Springer
Abstract Mobile Ad-hoc Network is a decentralized wireless network which is drastically
growing day by day. It can be vulnerable to several threats and attacks, namely wormhole …

Wormhole attack detection techniques in ad-hoc network: A systematic review

C Gupta, L Singh, R Tiwari - Open Computer Science, 2022 - degruyter.com
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …