A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks [PDF]
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose.
Youngho Cho, Gang Qu
doaj +5 more sources
Packet Drop Attack Detection Techniques in Wireless Ad hoc Networks: A Review [PDF]
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks.
Kennedy Edemacu+2 more
semanticscholar +8 more sources
Detection and Defense Against Packet Drop Attack in MANET [PDF]
MANET is a temporary network for a specified work and with the enormous growth MANETs it is becoming important and simultaneously challenging to protect this network from attacks and other threats. Packet drop attack or gray hole attack is the easiest way to make a denial of service in these dynamic networks.
Tariq Ahamad
semanticscholar +4 more sources
NAODV-Distributed Packet Dropping Attack Detection in MANETs [PDF]
ad hoc network (MANET) is a self configuring network in which mobile nodes are connected by wireless link. Communication in MANET is done with the help of cooperation of nodes in the network. Due to its intrinsic properties like dynamic network topology, open medium, lack of central monitoring system, these are vulnerable to several attacks.
Bobby SharmaKakoty+2 more
openalex +2 more sources
Detection and Isolation of Packet Dropping Attacker in MANETs [PDF]
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs.
Ahmed F. Mohamed+3 more
openalex +3 more sources
DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM [PDF]
In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop
Ahmad Sanmorino, Setiadi Yazid
doaj +5 more sources
A distributed protocol for detection of packet dropping attack in mobile ad hoc networks [PDF]
7 pages, 9 figures, 1 table. In Proceedings of the International Conference on Telecommunications and Malaysian International Conference on Communications (ICT-MICC'07), May 14-17, Penang, Malaysia. Paper ID: 74, Track: 3: Ad Hoc Routing and Protocols.
Jaydip Sen+4 more
openalex +5 more sources
A Novel Routing Technique against Packet Dropping Attack in Adhoc Networks [PDF]
Problem Statement: Mobile adhoc networks (MANETs) were extensively used in defense and rescue applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. This dynamic property of MANET has rendered it vulnerable to various security attacks.
N. Bhalaji+2 more
openalex +3 more sources
A flying ad-hoc network dataset for early time series classification of grey hole attacks [PDF]
Flying ad-hoc networks (FANETs) consist of multiple unmanned aerial vehicles (UAVs) that rely on multi-hop routes for communication. These routes are particularly susceptible to grey hole attacks, necessitating swift and accurate defence to preserve the ...
Charles Hutchins+3 more
doaj +2 more sources
Detection of Packet Dropping Attack Based on Evidence Fusion in IoT Networks [PDF]
Internet of Things (IoT) is widely used in environmental monitoring, smart healthcare, and other fields. Due to its distributed nature, IoT is vulnerable to various internal attacks. One of these attacks is the packet-dropping attack, which is very harmful.
Weichen Ding+4 more
openalex +2 more sources