RETRACTED: Isolating Wormhole Attack in Wireless Sensor Networks


Short Retraction Notice

Circuits and Systems (CS) does not meet author’s publication requirements.

This article has been retracted to straighten the academic record. In making this decision the Editorial Board follows COPE's Retraction Guidelines. Aim is to promote the circulation of scientific research by offering an ideal research publication platform with due consideration of internationally accepted standards on publication ethics. The Editorial Board would like to extend its sincere apologies for any inconvenience this retraction may have caused.

Please see the article page for more details. The full retraction notice in PDF is preceding the original paper which is marked "RETRACTED".

Share and Cite:


Conflicts of Interest

The authors declare no conflicts of interest.


[1] Wood, A.D. and Stankovic, J.A. (2013) A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks. CRC Press, USA.
[2] Eik, C., Mun, L., Ng, Y., Leckie, C. and Palaniswami, M. (2015) Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks, 17, No. 8.
[3] Sankarasubramaniam, A.Y., Sung, W. and Cayiric, E. (2012) A Survey on Wireless Sensor Security. The Journal of Telecommunications Networking.
[4] Gupptta, S. (2016) Similar Type Detection in Wireless Sensor Networks. MS Thesis, University of Houstan.
[5] Schonderwoaerd, R., Bruten, J. and Holland, O. (2016) Ant-Like Agents for Load Balancing in Telecommunications Networks. CM Journal of Information Technology, 4, No. 8.
[6] Zhigang, Xi Huei and Xeguang (2012) A Routing Protocol in Wireless Sensor Networks Based on Optimization Technique Ant Colony. International Conference on Information Application Technology, University of Canberra, Australia.
[7] Tiranauch, A. (2015) A Survey on Intrusion Detection in Mobile Ad Hoc Networks. In: Wireless/Mobile Networks Security, Chap. 7, Springer.
[8] Aroora, N., Junaeja, D. and Bannsal, S. (2015) An Ant-Based Routing Algorithm for Detecting Attacks in Wireless Sensor Networks. JCIR.
[9] Xiao, B. and Yu, B. (2016) Discovering Selective Progressing Attacks in Wireless Sensor Networks. IPDPS, Greece.
[10] Chang, E., Gao, L., Han, S. and Dillon, T. (2013) Taxonomy of Attacks on Wireless Sensor Networks. Springer, London.
[11] Qiaen, D., Chengh, H., Wulfe, W. and Cheng, L. (2016) Energy Balance Routing for Wireless Sensor Networks, Based on Swarm Intelligence. Second International Symposium on Intelligent Information Technology Application, USA.
[12] Karlloef, C. and Wangner, D. (2013) Wireless Sensor Network Attacks Secure Routing and Countermeasures. Proceeding of the IEEE International Workshop on Sensor network Protocols and Applications, California.
[13] Bahrgav, B. and Wang, W. (2016) Wormholes in Sensor Networks Visualization. ACM Press, New York, NY, USA.
[14] Kar, A. and Kumar, K. (2013) Analysis of Wireless Sensor Network Security. Journal of Next-Generation Networks (JNGN), 5, No. 7.
[15] Eberhart Richard, C., Kennedy, J. and Shi, Y. (2015) Swarm Intelligence. Moargan Kaauffmann Publishers, San Francisco.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.