On the control of microgrids against cyber-attacks: A review of methods and applications

A Solat, GB Gharehpetian, MS Naderi… - Applied Energy, 2024 - Elsevier
Nowadays, the use of renewable generations, energy storage systems (ESSs) and
microgrids (MGs) has been developed due to better controllability of distributed energy …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

Machine learning based approach to detect wormhole attack in VANETs

PK Singh, RR Gupta, SK Nandi, S Nandi - … of the Workshops of the 33rd …, 2019 - Springer
VANET is one of the key enabling technologies for connected and autonomous vehicles
(CAVs). In a vehicular plane of the VANETs, vehicles communicate with each other for …

Mitigating selective forwarding attacks with a channel-aware approach in WMNs

DM Shila, Y Cheng, T Anjali - IEEE transactions on wireless …, 2010 - ieeexplore.ieee.org
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh
networks (WMNs) known as selective forwarding attack (aka gray hole attacks). With such an …

Review of the techniques against the wormhole attacks on wireless sensor networks

G Farjamnia, Y Gasimov, C Kazimov - Wireless Personal Communications, 2019 - Springer
With the advancement of technology, the application of Wireless Sensor Networks (WSNs)
has increased in various fields, such as; military, medical and business. WSNs have the …

Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim… - Scientific Reports, 2024 - nature.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …

Securing underwater sensor networks against routing attacks

T Dargahi, HHS Javadi, H Shafiei - Wireless Personal Communications, 2017 - Springer
With the advances in technology, there has been an increasing interest both from research
and industrial communities in the use of Underwater Wireless Sensor Networks (UWSNs) …

Notice of Violation of IEEE Publication Principles: A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks

M Jain, H Kandwal - … on Advances in Computing, Control, and …, 2009 - ieeexplore.ieee.org
Notice of Violation of IEEE Publication Principles" A Survey on Complex Wormhole Attack in
Wireless Ad Hoc Networks" by M. Jain and H. Kandwal in the Proceedings of the …

[PDF][PDF] A full image of the wormhole attacks-towards introducing complex wormhole attacks in wireless ad hoc networks

M Azer, S El-Kassas, M El-Soudani - arxiv preprint arxiv:0906.1245, 2009 - arxiv.org
A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in
wireless Ad Hoc Networks Page 1 (IJCSIS) International Journal of Computer Science and …

Geographic wormhole detection in wireless sensor networks

M Sookhak, A Akhundzada, A Sookhak… - PloS one, 2015 - journals.plos.org
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly
susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the …