Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim… - Scientific Reports, 2024 - nature.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …

[PDF][PDF] Current security threats in applications of wireless sensor network

A John, FI Isnin, SHH Madni - International Journal on Engineering …, 2023 - academia.edu
Wireless Sensor Networks (WSNs) are either homogeneous or heterogeneous, depending
on whether the network is made up of distributed nodes with the same properties; …

Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree

D Chen, A Aljohani - Mobile Networks and Applications, 2024 - Springer
Data protection shares sensitive data with authorized users over a wireless communication
network (WCN). To protect the data, a secured sharing method for WCNs is required, which …

ESPAR array design for the UHF RFID wireless sensor communication system

MM Rahman, HG Ryu - International Journal of Communication …, 2023 - Wiley Online Library
In this paper, in order to improve the received signal strength (RSS) and signal quality, three
arrays of electronically steerable parasitic array radiator (ESPAR) antennas are suggested …

DAIWN: detection and isolation of wormhole nodes in wireless ad hoc networks

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim - 2023 - researchsquare.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographicmeasures and derail the entire communication network. It is …

Resha** Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack

H Shahid, H Ashraf, NZ Jhanjhi… - … With Generative AI …, 2025 - igi-global.com
Security is a major problem in wireless sensor networks (WSN) because they are vulnerable
to a variety of dangerous threats, the deadliest of which is the wormhole assault. These …

Comparative Analysis of Secure Range Free DV-Hop Localization algorithms against wormhole attack in WSNs

R Garg, T Gulati - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
Node localization is a requisite in wireless sensor networks (WSNs) because of their far-
reaching applications in many fields like surveillance, tracking, security, etc. A major …

WOMN: WOrMhole Attack DetectioN and Mitigation Using Lightweight Distributed IDS in IoT Network

P Bhale, D Ray, S Biswas… - 2023 IEEE Guwahati …, 2023 - ieeexplore.ieee.org
Nowadays, the Internet of Things (IoT) is an emerging technology with a wide range of IoT
devices. However, the diverse, energy-dependent, and resource-limited nature of IoT …

Multilingual Sentiment Analysis Using Deep Learning: Survey-[v1]

U Ihsan - 2023 - preprints.org
The rise of the Internet has enabled people to express their opinions on various subjects
through social media, blogs, and website comments. As a result, there has been a significant …

[CITA][C] Research Article Detection and Isolation of Wormhole Nodes in Wireless Ad Hoc Networks

DS Bhatti, S Saleem, A Imran, BH Lim, KI Kim