A survey of potential security issues in existing wireless sensor network protocols
The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application
domains including critical infrastructure systems, sets an extremely high security bar in the …
domains including critical infrastructure systems, sets an extremely high security bar in the …
Routing attacks and countermeasures in the RPL-based internet of things
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol
standardized for constrained environments such as 6LoWPAN networks. Providing security …
standardized for constrained environments such as 6LoWPAN networks. Providing security …
DoS attacks in mobile ad hoc networks: A survey
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited
resources and lack of centralized administration, as a result, they are vulnerable to different …
resources and lack of centralized administration, as a result, they are vulnerable to different …
Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism
The Metaverse shows great potential to facilitate the development of new technologies.
Because the security of the Metaverse has attracted considerable attention, the automatic …
Because the security of the Metaverse has attracted considerable attention, the automatic …
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Node compromise is a serious threat to wireless sensor networks deployed in unattended
and hostile environments. To mitigate the impact of compromised nodes, we propose a suite …
and hostile environments. To mitigate the impact of compromised nodes, we propose a suite …
On the intruder detection for sinkhole attack in wireless sensor networks
In a wireless sensor network, multiple nodes would send sensor readings to a base station
for further processing. It is well-known that such a many-to-one communication is highly …
for further processing. It is well-known that such a many-to-one communication is highly …
Intrusion detection in the RPL-connected 6LoWPAN networks
The interconnectivity of 6LoWPAN networks with the Internet raises serious security
concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted …
concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted …
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
In multihop wireless systems, the need for cooperation among nodes to relay each other's
packets exposes them to a wide range of security attacks. A particularly devastating attack is …
packets exposes them to a wide range of security attacks. A particularly devastating attack is …
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
In a wireless sensor network, multiple nodes would send sensor readings to a base station
for further processing. It is known that such a many-to-one communication is highly …
for further processing. It is known that such a many-to-one communication is highly …
Detecting and avoiding wormhole attacks in wireless ad hoc networks
A particularly severe attack on routing protocols in ad hoc networks is the so-called worm-
hole attack in which two or more colluding attackers record packets at one location, and …
hole attack in which two or more colluding attackers record packets at one location, and …