4.6 Review

A systematic review of routing attacks detection in wireless sensor networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks

Gowdham Chinnaraju et al.

Summary: Wireless sensor networks (WSNs) have gained attention due to their flexibility, monitoring capability, and scalability, but they are also vulnerable to attacks. This study proposes a simple approach to detect and prevent attacks by warning and blocking malicious nodes, improving network performance and utilization.

COMPUTER SYSTEMS SCIENCE AND ENGINEERING (2022)

Article Automation & Control Systems

Lamport Certificateless Signcryption Deep Neural Networks for Data Aggregation Security in WSN

P. Saravanakumar et al.

Summary: This study proposes a novel technique, LCS-SICADNN, based on artificial deep neural networks and the Lamport one-time certificateless signcryption technique to ensure the security of data aggregation in wireless sensor networks. Performance analysis shows that LCS-SICADNN outperforms conventional methods in terms of security, throughput, delay, packet drop, and overhead.

INTELLIGENT AUTOMATION AND SOFT COMPUTING (2022)

Article Computer Science, Information Systems

Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks

Abrar M. Alajlan

Summary: This paper introduces a multi-step detection scheme for detecting wormhole attacks in wireless sensor networks. By integrating multiple detection modules, the proposed scheme is able to effectively detect, recover, and isolate wormhole attacks in a distributed environment.

CMC-COMPUTERS MATERIALS & CONTINUA (2022)

Article Computer Science, Artificial Intelligence

A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks

Sujesh P. Lal et al.

Summary: Multi-hop wireless sensor networks are implemented in various domains to collect data for critical infrastructure decision-making. Malevolent opponents may interfere with data by adding extra nodes, posing a threat to existing nodes. Protecting data trustworthiness is crucial for accurate decision-making, with information provenance playing a key role in analyzing the reliability of sensor data.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Artificial Intelligence

Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN

Arthanareeswaran Angappan et al.

Summary: Wireless Sensor Networks (WSN) are commonly used in hostile areas and face threats of Sybil attacks. This paper proposes a new protocol for identifying and isolating Sybil attacks, using intra-cluster communication and RSSI values to identify Sybil nodes. The protocol has been extensively simulated in various topologies, demonstrating high efficiency in detection ratio, energy utilization, memory usage, computation, and communication requirements.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Hardware & Architecture

PCTBC: Power Control Tree-Based Cluster Approach for Sybil Attack in Wireless Sensor Networks

Surinder Singh et al.

Summary: This paper introduces the main features of Wireless Sensor Networks (WSN) and the hybrid approach used to identify Sybil attacks, including the construction of clusters based on Power Control Tree and the utilization of position and identity verification for node clustering, aimed at improving energy efficiency and preventing network attacks.

JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2021)

Article Computer Science, Hardware & Architecture

Fuzzy-Based Reliability Prediction Model for Secure Routing Protocol Using GA and TLBO for Implementation of Black Hole Attacks in WSN

Sajad Nosratian et al.

Summary: This study presents a fuzzy-based trust prediction model to detect and prevent black hole attacks in wireless sensor networks, along with a new routing protocol based on the shortest path and trust to the path nodes. The proposed algorithms are effective in detecting and preventing black hole attacks, with the TLBO algorithm showing the best response for path selection.

JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2021)

Article Telecommunications

Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN

Surinder Singh et al.

Summary: This paper proposes a method for detecting and correcting selective forwarding attacks in WSN by categorizing nodes into different types and introducing checkpoint nodes to improve system efficiency, minimize the impact of attacks, and enhance data transmission quality.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

NISA: Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor Networks

Xintao Huan et al.

Summary: The study proposes a new node identification scheme called NISA, which utilizes reverse time synchronization framework and radio link information to achieve simultaneous node identification and attack detection. Experimental results demonstrate that NISA can accurately identify nodes and detect Spoofing attacks.

IEEE TRANSACTIONS ON COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Employ DBSCAN and Neighbor Voting to Screen Selective Forwarding Attack Under Variable Environment in Event-Driven Wireless Sensor Networks

Yinghong Liu et al.

Summary: This study proposes a combined scheme for detecting selective forwarding attacks in wireless sensor networks under harsh environments. The scheme utilizes a data clustering algorithm to identify malicious nodes and implements a voting decision method to prevent misjudgment of nodes under harsh conditions. Simulation results show low false detection and missed detection rates with minimal energy consumption in this scenario.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Black hole attack prevention scheme using a blockchain-block approach in SDN-enabled WSN

Emre Karakoc et al.

Summary: The study investigates security threats in SDN-enabled WSN and proposes a lightweight security model utilizing blockchain technology to protect flow tables in nodes and secure data packet transmission.

INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING (2021)

Article Computer Science, Information Systems

TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing

Weidong Fang et al.

WIRELESS NETWORKS (2020)

Article Engineering, Electrical & Electronic

A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks

Shi Dong et al.

JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY (2020)

Article Telecommunications

Beeware Routing Scheme for Detecting Network Layer Attacks in Wireless Sensor Networks

R. S. Raghav et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Telecommunications

The Design of a Defense Mechanism to Mitigate Sinkhole Attack in Software Defined Wireless Sensor Cognitive Radio Networks

Lanka Chris Sejaphala et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Mathematics, Interdisciplinary Applications

Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack

Hongbin Wang et al.

DISCRETE DYNAMICS IN NATURE AND SOCIETY (2020)

Article Multidisciplinary Sciences

Design of event-driven control strategy for spoofing attacks in wireless sensor networks

Liu He et al.

SN APPLIED SCIENCES (2020)

Article Engineering, Electrical & Electronic

An efficient voting based method to detect sink hole in wireless acoustic sensor networks

N. Nithiyanandam et al.

INTERNATIONAL JOURNAL OF SPEECH TECHNOLOGY (2020)

Article Computer Science, Information Systems

Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust

Deepak C. Mehetre et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks

Zhaohui Zhang et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Augmented lightweight security scheme with access control model for wireless medical sensor networks

A. Vaniprabha et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Engineering, Electrical & Electronic

Exploiting Dispersive Power Gain and Delay Spread for Sybil Detection in Industrial WSNs: A Multi-Kernel Approach

Qihao Li et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2019)

Article Engineering, Electrical & Electronic

Detecting Sybil nodes in stationary wireless sensor networks using learning automaton and client puzzles

Mojtaba Jamshidi et al.

IET COMMUNICATIONS (2019)

Article Telecommunications

Jensen-Shannon Divergence Based Independent Component Analysis to Detect and Prevent Black Hole Attacks in Healthcare WSN

A. John Clement Sunder et al.

WIRELESS PERSONAL COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Research on the intrusion detection model based on improved cumulative summation and evidence theory for wireless sensor network

Fengjun Shang et al.

PHOTONIC NETWORK COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Accurate detection of selective forwarding attack in wireless sensor networks

Qiong Zhang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Enhanced TESRP Protocol for Isolation of Selective Forwarding Attack in WSN

Harkiranvir Kaur et al.

ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II (2019)

Article Computer Science, Information Systems

Trust-based Selfish Node Detection Mechanism using Beta Distribution in Wireless Sensor Network

Kanchana Devi et al.

JOURNAL OF ICT RESEARCH AND APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

A light-weight solution for blackhole attacks in wireless sensor networks

Bilal Erman Bilgin et al.

TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES (2019)

Article Computer Science, Information Systems

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks

Sebastian Terence et al.

KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS (2019)

Article Telecommunications

Modeling and Analysis of Worm Propagation in Wireless Sensor Networks

Akansha Singh et al.

WIRELESS PERSONAL COMMUNICATIONS (2018)

Article Telecommunications

Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks

Qussai Yaseen et al.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2018)

Article Engineering, Electrical & Electronic

Distributed Kalman filtering for robust state estimation over wireless sensor networks under malicious cyber attacks

Fuxi Wen et al.

DIGITAL SIGNAL PROCESSING (2018)

Article Computer Science, Artificial Intelligence

Identifying localization attacks in wireless sensor networks using deep learning

Hua Wang et al.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2018)

Article Computer Science, Information Systems

Scalable and Distributed Detection Anaysis on Wormhole Links in Wireless Sensor Networks for Networked Systems

Jayashree Padmanabhan et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless sensor Networks

Yali Yuan et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks

Hongliang Zhu et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2018)

Article Computer Science, Interdisciplinary Applications

A Wireless Sensor Network-Based Defence Model against Selective Forwarding Attack

Yun Ji

INTERNATIONAL JOURNAL OF ONLINE ENGINEERING (2018)

Article Computer Science, Information Systems

A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs

Rezvan Almas Shehni et al.

FUTURE INTERNET (2018)

Proceedings Paper Computer Science, Artificial Intelligence

The Rise of Internet of Things (IoT) in Big Healthcare Data: Review and Open Research Issues

Zainab Alansari et al.

PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, VOL 2 (2018)

Article Telecommunications

A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks

Mohammad Wazid et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Health Care Sciences & Services

Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack

K. Nirmal Raja et al.

JOURNAL OF MEDICAL SYSTEMS (2017)

Article Computer Science, Information Systems

Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks

Peng Li et al.

SECURITY AND COMMUNICATION NETWORKS (2017)

Article Chemistry, Analytical

Attack Classification Schema for Smart City WSNs

Victor Garcia-Font et al.

SENSORS (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Detection and Prevention of Blackhole Attacks in Wireless Sensor Networks

Gurjinder Kaur et al.

INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017) (2017)

Proceedings Paper Computer Science, Information Systems

Defenses Against Wormhole Attacks in Wireless Sensor Networks

Rui Ma et al.

NETWORK AND SYSTEM SECURITY (2017)

Article Computer Science, Hardware & Architecture

A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks

Mojtaba Jamshidi et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Information Systems

Secure data aggregation using access control and authentication for wireless sensor networks

Abdul Razaque et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)

Noor Alsaedi et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Interdisciplinary Applications

Design of Trusted Security Routing in Wireless Sensor Networks Based on Quantum Ant Colony Algorithm

Xiao-bin Shu et al.

INTERNATIONAL JOURNAL OF ONLINE ENGINEERING (2017)

Article Telecommunications

Securing wireless sensor networks for improved performance in cloud-based environments

Ashfaq Hussain Farooqi et al.

ANNALS OF TELECOMMUNICATIONS (2017)

Article Computer Science, Information Systems

An adaptive sinkhole aware algorithm in wireless sensor networks

Ghazaleh Jahandoust et al.

AD HOC NETWORKS (2017)

Article Computer Science, Information Systems

Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks

Muhammad Altaf Khan et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Telecommunications

Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission

N. M. Saravana Kumar et al.

WIRELESS PERSONAL COMMUNICATIONS (2016)

Article Engineering, Electrical & Electronic

Detection of wormhole attacks on IPv6 mobility-based wireless sensor network

Gu-Hsin Lai

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2016)

Article Engineering, Electrical & Electronic

Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks

Ju Ren et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Information Systems

MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs

Anfeng Liu et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2016)

Article Computer Science, Information Systems

WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks

Rupinder Singh et al.

MOBILE INFORMATION SYSTEMS (2016)

Article Computer Science, Information Systems

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

Mohammad Wazid et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

An energy efficient encryption method for secure dynamic WSN

Mohamed Elhoseny et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Chemistry, Analytical

A Security Mechanism for Cluster-Based WSN against Selective Forwarding

Hai Zhou et al.

SENSORS (2016)

Article Telecommunications

An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks

Mohammad Wazid et al.

WIRELESS PERSONAL COMMUNICATIONS (2016)

Article Computer Science, Information Systems

MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs

Anfeng Liu et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2016)

Article Engineering, Electrical & Electronic

Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks

M. Saud Khan et al.

JOURNAL OF SENSORS (2016)

Article Engineering, Electrical & Electronic

DETECTING SYBIL ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL ANALYSIS

P. Raghu Vamsi et al.

INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS (2016)

Article Telecommunications

Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network

Saswati Mukherjee et al.

JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS (2016)

Article Computer Science, Information Systems

Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique

G. Keerthana et al.

INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS (2016)

Article Health Care Sciences & Services

Guidance for conducting systematic scoping reviews

Micah D. J. Peters et al.

INTERNATIONAL JOURNAL OF EVIDENCE-BASED HEALTHCARE (2015)