Wireless sensor network security: A recent review based on state-of-the-art works

M Faris, MN Mahmud, MFM Salleh… - International Journal of …, 2023 - journals.sagepub.com
Wireless sensor networks (WSNs) are a major part of the telecommunications sector. WSN is
applied in many aspects, including surveillance battlefields, patient medical monitoring …

Wormhole attack detection system for IoT network: A hybrid approach

SA Bhosale, SS Sonavane - Wireless Personal Communications, 2022 - Springer
Many errors in data communication cause security attacks in Internet of Things (IoT). Routing
errors at network layer are prominent errors in IoT which degrade the quality of data …

An integrated exploration on internet of things and wireless sensor networks

S Sharma, VK Verma - Wireless Personal Communications, 2022 - Springer
The ability to access data from remote locations is meant possible with the help of computer
networks. These networks may be wired or wireless. Modern improvements in wireless …

A hybrid wormhole attack detection in mobile ad-hoc network (MANET)

M Tahboush, M Agoyi - IEEE Access, 2021 - ieeexplore.ieee.org
Mobile Ad-hoc Networks (MANET) are decentralized wireless networks that communicate
without pre-existing infrastructure. MANETs are vulnerable to the most popular types of …

[PDF][PDF] Energy optimised security against wormhole attack in iot-based wireless sensor networks

H Shahid, H Ashraf, H Javed, M Humayun… - Comput. Mater …, 2021 - cdn.techscience.cn
An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the
data and share it with the central repositories. These sensors are battery-driven and …

A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things

S Deshmukh-Bhosale, SS Sonavane - Procedia Manufacturing, 2019 - Elsevier
Today there is a trend of the Internet of Things (IoT) where many objects are connected to
the internet. In future number of objects connected to the internet will be more as compared …

Security explorations for routing attacks in low power networks on internet of things

S Sharma, VK Verma - The Journal of Supercomputing, 2021 - Springer
The routing protocol for low power and lossy networks works as an effective method for
communication in Contiki. However, many security attacks exist in RPL. These attacks affect …

Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks

K Lakshmi Narayanan, R Santhana Krishnan… - Wireless Personal …, 2021 - Springer
Wireless sensor network allows nodes to communicate with another using wireless
channels so that it is necessary for packet delivery to the nodes. Black hole attack occurs …

Wormhole attack mitigation strategies and their impact on wireless sensor network performance: A literature survey

H Shahid, H Ashraf, A Ullah, SS Band… - International journal of …, 2022 - Wiley Online Library
Wireless sensor networks (WSNs) consist of hundreds of small sensors that collect and
report data. During data sharing, these WSNs become vulnerable to numerous security …

Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review

A Oztoprak, R Hassanpour, A Ozkan… - ACM Computing …, 2024 - dl.acm.org
Wireless Sensor Networks (WSNs) represent an innovative technology that integrates
compact, energy-efficient sensors with wireless communication functionalities, facilitating …