Results 271 to 280 of about 46,457 (297)
Some of the next articles are maybe not open access.
On Jamming and Black Hole Attacks in Heterogeneous Wireless Networks
IEEE Transactions on Vehicular Technology, 2019The proliferation of radio-enabled equipment, including sensors, controllers, actuators, mobile handhelds, etc., into the today's heterogeneous wireless network (HWN) has led to the support of different vertical services on-top of the same physical infrastructure. Such an approach increases the potential for enhanced multiplexing gains due to the joint
Anastasia Tsiota +3 more
openaire +2 more sources
A reputation system for detection of black hole attack in vehicular networking
2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015In recent years, vehicular networks has drawn special attention as it has significant potential to play an important role in future smart city to improve the traffic efficiency and guarantee the road safety. Safety in vehicular networks is crucial because that it affects the life of humans.
Khatoun, Rida +4 more
openaire +4 more sources
Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks
International Conference on Electronics, Communication and Instrumentation (ICECI), 2014In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc.
Anwar Hussain, Mozmin Ahmed
openaire +2 more sources
Black Hole Search with Tokens in Interconnected Networks
2009We study the Black Hole search problem using mobile agents in three interconnected network topologies: hypercube, torus and complete network. We do so without relying on local storage. Instead we use a less-demanding and less-expensive token mechanism.
openaire +2 more sources
Detection of Black Hole Attack in Delay-Tolerant Network
2019In spite of modernization of humanity, in emergency situations like after any natural calamity our infrastructure-based network backbone gets affected first. Disaster relief volunteers face the immense pain to set up a communication system, due to the failure of telecommunication infrastructure and long-standing power.
Rohan Dutta +6 more
openaire +2 more sources
Black Hole Attack Detection in Wireless Sensor Networks
WSN has come as a useful technology and has proved to be a motivational force for new technology that is Internet of Things (IoT). Due to its characteristics limitations, security is one of key challenge for the performance of Wireless sensor networks.Mandeep Kumar, Jahid Ali
openaire +1 more source
Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network
2016Wireless mesh network (WMN) is considered as a key technology in today’s networking era. In this, security is determined as a vital constraint. Several approaches have been proposed to provide secure communication in WMN but communication security possibilities always exist and are very hard to maintain.
Hemraj Saini, Geetanjali Rathee
openaire +2 more sources

