A survey of potential security issues in existing wireless sensor network protocols

I Tomić, JA McCann - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application
domains including critical infrastructure systems, sets an extremely high security bar in the …

Routing attacks and countermeasures in the RPL-based internet of things

L Wallgren, S Raza, T Voigt - International Journal of …, 2013 - journals.sagepub.com
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol
standardized for constrained environments such as 6LoWPAN networks. Providing security …

DoS attacks in mobile ad hoc networks: A survey

RH Jhaveri, SJ Patel, DC **wala - 2012 second international …, 2012 - ieeexplore.ieee.org
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited
resources and lack of centralized administration, as a result, they are vulnerable to different …

Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism

SY Kuo, FH Tseng, YH Chou - Future Generation Computer Systems, 2023 - Elsevier
The Metaverse shows great potential to facilitate the development of new technologies.
Because the security of the Metaverse has attracted considerable attention, the automatic …

Location-based compromise-tolerant security mechanisms for wireless sensor networks

Y Zhang, W Liu, W Lou, Y Fang - IEEE Journal on selected …, 2006 - ieeexplore.ieee.org
Node compromise is a serious threat to wireless sensor networks deployed in unattended
and hostile environments. To mitigate the impact of compromised nodes, we propose a suite …

On the intruder detection for sinkhole attack in wireless sensor networks

ECH Ngai, J Liu, MR Lyu - 2006 IEEE international conference …, 2006 - ieeexplore.ieee.org
In a wireless sensor network, multiple nodes would send sensor readings to a base station
for further processing. It is well-known that such a many-to-one communication is highly …

Intrusion detection in the RPL-connected 6LoWPAN networks

D Shreenivas, S Raza, T Voigt - … of the 3rd ACM international workshop …, 2017 - dl.acm.org
The interconnectivity of 6LoWPAN networks with the Internet raises serious security
concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted …

MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks

I Khalil, S Bagchi, NB Shroff - Ad Hoc Networks, 2008 - Elsevier
In multihop wireless systems, the need for cooperation among nodes to relay each other's
packets exposes them to a wide range of security attacks. A particularly devastating attack is …

An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks

ECH Ngai, J Liu, MR Lyu - Computer Communications, 2007 - Elsevier
In a wireless sensor network, multiple nodes would send sensor readings to a base station
for further processing. It is known that such a many-to-one communication is highly …

Detecting and avoiding wormhole attacks in wireless ad hoc networks

F Nait-Abdesselam, B Bensaou… - IEEE Communications …, 2008 - ieeexplore.ieee.org
A particularly severe attack on routing protocols in ad hoc networks is the so-called worm-
hole attack in which two or more colluding attackers record packets at one location, and …