Packet leashes: a defense against wormhole attacks in wireless networks
… of networks, such as wireless LANs and cellular networks. Section II of this paper presents …
wormhole attack and discusses how the wormhole attack can be used against ad hoc network …
wormhole attack and discusses how the wormhole attack can be used against ad hoc network …
Detection and defense mechanisms against wormhole attacks in wireless sensor networks
B Bhushan, G Sahoo - … advances in computing, communication …, 2017 - ieeexplore.ieee.org
… Wormhole attacks are one of the most severe attacks launched even in wireless networks …
Here we have introduced the consequences of wormhole attack on WSN routing protocols. …
Here we have introduced the consequences of wormhole attack on WSN routing protocols. …
Wormhole attacks in wireless networks
… a packet, at one location in the network, tunnels the packet (… packet leashes to detect
wormhole attacks, and we present two types of leashes: geographic leashes and temporal leashes. …
wormhole attacks, and we present two types of leashes: geographic leashes and temporal leashes. …
TCPL: A Defense against wormhole attacks in wireless sensor networks
KEN Kumar, MA Waheed, KK Basappa - AIP Conference Proceedings, 2010 - pubs.aip.org
… , an attacker places two or more transceivers at different locations on a wireless network as
… the wormhole attack and introduce packet leashes to defend against the wormhole attack. …
… the wormhole attack and introduce packet leashes to defend against the wormhole attack. …
State of the art on defenses against wormhole attacks in wireless sensor networks
T Giannetsos, T Dimitriou… - … Wireless Communication …, 2009 - ieeexplore.ieee.org
… CONCLUSIONS In this paper we reviewed one of the most severe routing attacks in wireless
networks, the wormhole attack. We discussed its impact on the underlying routing protocol …
networks, the wormhole attack. We discussed its impact on the underlying routing protocol …
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
… to detect other control attacks like the Sybil and the sinkhole attacks by changing the kind of
… for attack modes used to launch the wormhole attack in multihop wireless networks. We have …
… for attack modes used to launch the wormhole attack in multihop wireless networks. We have …
Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks
… In [28], we introduced the concept of local monitoring and applied it to detection and isolation
of wormhole attacks in static networks, the problem addressed in the current paper. In [31], …
of wormhole attacks in static networks, the problem addressed in the current paper. In [31], …
[PDF][PDF] Wormhole attack in wireless sensor network
… wireless networks to the wormhole attack. One method or idea is of packet leashes for detecting
wormhole attacks. … hoc networks but also works for the other types of networks as well. A …
wormhole attacks. … hoc networks but also works for the other types of networks as well. A …
[PDF][PDF] Wireless sensor network security: approaches to detecting and avoiding wormhole attacks
… As a result, a WSN’s reliability and precision are considered to be less reliable and precise
than a traditional wireless network. At the heart of a WSN are three types of densely deployed …
than a traditional wireless network. At the heart of a WSN are three types of densely deployed …
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
… range of wireless network protocols without … wormhole attack scenarios disrupting network
protocols and applications are available from [1], [4]. We now illustrate how a wormhole attack …
protocols and applications are available from [1], [4]. We now illustrate how a wormhole attack …