The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Lukman Sharif, Munir Ahmed, Journal of Information Processing Systems Vol. 6, No. 2, pp. 177-184, Jun. 2010
 https://doi.org/10.3745/JIPS.2010.6.2.177
                            
                                
                                    https://doi.org/10.3745/JIPS.2010.6.2.177
                            
                        
                Keywords: Secure routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack
Fulltext:
Abstract
Statistics
                    Show / Hide Statistics
                    
                    
                        
                            
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
                        
                            
                    
                
                Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|  | 
Cite this article
[APA Style]
Sharif, L. & Ahmed, M. (2010). The Wormhole Routing Attack in Wireless Sensor Networks (WSN). Journal of Information Processing Systems, 6(2), 177-184. DOI: 10.3745/JIPS.2010.6.2.177.
                [IEEE Style]
L. Sharif and M. Ahmed, "The Wormhole Routing Attack in Wireless Sensor Networks (WSN)," Journal of Information Processing Systems, vol. 6, no. 2, pp. 177-184, 2010. DOI: 10.3745/JIPS.2010.6.2.177.
                [ACM Style]
Lukman Sharif and Munir Ahmed. 2010. The Wormhole Routing Attack in Wireless Sensor Networks (WSN). Journal of Information Processing Systems, 6, 2, (2010), 177-184. DOI: 10.3745/JIPS.2010.6.2.177.
                