Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim… - Scientific Reports, 2024 - nature.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …

Elimination of energy and communication tradeoff to resist wormhole attack in MANET

SB Geetha, VC Patil - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Challenges in meeting the best security standards is still an unsolved question in the area of
mobile adhoc network especially pertaining to wormhole attack. Although there are many …

Graph-based energy supportive routing protocol to resist wormhole attack in mobile adhoc network

SB Geetha, VC Patil - Wireless Personal Communications, 2017 - Springer
With the evolution of numerous secure routing protocols in mobile adhoc network, there is a
tradeoff between the security effectiveness against wormhole attack and energy required to …

[PDF][PDF] A brief analysis on detection and avoidance techniques of wormhole attack in MANET

D Patel, P Trivedi, MB Potdar - International Journal of Computer …, 2015 - Citeseer
ABSTRACT Mobile Ad-hoc Network (MANETs) is a temporary wireless network, which is self-
configuring in which nodes moves freely and continuously. It consists of a collection of …

ZIDS: zonal-based intrusion detection system for studying the malicious node behaviour in MANET

V Sangeetha, SS Kumar - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
The communication behaviour of mobile nodes in adhoc network are quite confusing to
understand owing to the decentralized architecture and dynamic topology. The existing …

DAIWN: Detection and Isolation of Wormhole Nodes in Wireless Ad Hoc Networks

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim - 2023 - researchsquare.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographicmeasures and derail the entire communication network. It is …

[PDF][PDF] Effects of Wormhole Attack on Routing Topology

Д Кашаіджа - Проблеми телекомунікацій, 2021 - pt.nure.ua
The article is devoted to investigating the effects of wormhole attacks on routing topology in
Wireless Sensor Networks (WSNs). Currently, WSNs are increasingly vulnerable to …

Fast rerouting for multiple link failures in IP networks using LOLS with AOMDV

DD Bhaiyya - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Internet playing most efficient part in today's interchangeable infrastructure but it has been
observed that IP networks affected with common network failures which cause the cautious …

[引用][C] Research Article Detection and Isolation of Wormhole Nodes in Wireless Ad Hoc Networks

DS Bhatti, S Saleem, A Imran, BH Lim, KI Kim

[引用][C] Detection and Avoidance of Wormhole Attack in MANET

D Patel, P Trivedi, MB Potdar