Google
This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which detects wormholes based on the distortions they create in a�...
Abstract—We propose a novel algorithm for detecting worm- hole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to�...
In this paper, we investigate the techniques to deal with wormhole attacks and propose a simple yet attractive approach for wormhole detection. Our approach is�...
This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which detects wormholes based on the distortions they create in a�...
Aug 29, 2023Precisely, the wormhole attack detection techniques follow either rule-based, feature-based, or signature-based identification. Karthigadevi,�...
Wormhole attack is a denial of service attack launched by malicious nodes by creating a tunnel through which the packets are replayed to malicious nodes�...
We study and propose a novel algorithm for detecting Wormhole Attacks in wireless ad hoc and sensor networks. The algorithm uses only local connectivity�...
Feb 10, 2024Key characteristics of a wormhole attack include tunnel creation, packet redirection, disruption of network topology, and the potential for�...
Wormhole attack is a grave attack in which two attackers locate themselves strategically in the network. Then the attackers keep on listening to the network.
People also ask
May 4, 2023Wormhole attacks can enable fast transmission of data between distant nodes by creating a direct tunnel, bypassing other nodes in the network.