[HTML][HTML] WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks

R Singh, J Singh, R Singh - Mobile Information Systems, 2016 - hindawi.com
Wormhole attack is a challenging security threat to wireless sensor networks which results in
disrupting most of the routing protocols as this attack can be triggered in different modes. In …

M‐LionWhale: multi‐objective optimisation model for secure routing in mobile ad‐hoc network

RM Chintalapalli, VR Ananthula - IET Communications, 2018 - Wiley Online Library
Mobile ad‐hoc network (MANET) is an emerging technology that comes under the category
of wireless network. Even though the network assumes that all its mobile nodes are trusted …

A detection and prevention system against collaborative attacks in mobile ad hoc networks

FA Khan, M Imran, H Abbas, MH Durad - Future Generation Computer …, 2017 - Elsevier
Abstract Mobile Ad hoc Networks (MANETs) are vulnerable to various kinds of threats due to
their dynamic nature and lack of a central point of control. Collaborative attacks occur when …

A comprehensive review on detection of wormhole attack in MANET

SK Jangir, N Hemrajani - … on ICT in Business Industry & …, 2016 - ieeexplore.ieee.org
As MANETs use wireless medium for Communication, these are susceptible to many
security attacks. In this paper a methodical review is done on the recent state of the research …

A wormhole attack detection and prevention technique in wireless sensor networks

A Siddiqui, A Karami… - International Journal of …, 2017 - repository.uel.ac.uk
Security is one of the major and important issues surrounding network sensors because of
its inherent liabilities, ie physical size. Since network sensors have no routers, all nodes …

Scalable and distributed detection analysis on wormhole links in wireless sensor networks for networked systems

J Padmanabhan, V Manickavasagam - IEEE Access, 2017 - ieeexplore.ieee.org
Recent surge in cyber physical systems (CPSs) which integrate cyber and physical worlds,
increases security risks at both the surfaces. The wireless sensor communication network is …

Isolation of Wormhole Attackers in IOV Using WPWP Packet.

SS Kanumalli, A Chinta… - Revue d'Intelligence …, 2019 - search.ebscohost.com
IOV is a unique form of VANETS network with a special kind of remote system which is
arranged with set of versatile vehicles that can be effortlessly included and expelled from the …

Privacy preservation with RTT‐based detection for wireless mesh networks

AK Roy, AK Khan - IET Information Security, 2020 - Wiley Online Library
Wireless mesh networks (WMNs) upraised as superior technology offering all aspects of
services as compared to conventional networks. Due to the absence of centralised authority …

T-whale: Trust and whale optimization model for secure routing in mobile ad-hoc network

CR Mohan, AV Reddy - … Journal of Artificial Life Research (IJALR), 2018 - igi-global.com
One of the infrastructureless networks built by various independent mobile nodes is mobile
ad hoc network (MANET), which is an emerging technology, requiring a secure routing …

Detection and avoidance of wormhole attacks in connected vehicles

SS Albouq, EM Fredericks - Proceedings of the 6th ACM Symposium on …, 2017 - dl.acm.org
The routing protocol in connected vehicles (CVs) is vulnerable to wormhole attacks where
attackers can deceive legitimate nodes and purport them as if they are immediate or close …