Results 1 to 10 of about 83,142 (315)

A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks [PDF]

open access: goldSensors, 2023
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose.
Youngho Cho, Gang Qu
doaj   +5 more sources

Packet Drop Attack Detection Techniques in Wireless Ad hoc Networks: A Review [PDF]

open access: greenInternational Journal of Network Security & Its Applications, 2014
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks.
Kennedy Edemacu   +2 more
semanticscholar   +8 more sources

Detection and Defense Against Packet Drop Attack in MANET [PDF]

open access: hybridInternational Journal of Advanced Computer Science and Applications, 2016
MANET is a temporary network for a specified work and with the enormous growth MANETs it is becoming important and simultaneously challenging to protect this network from attacks and other threats. Packet drop attack or gray hole attack is the easiest way to make a denial of service in these dynamic networks.
Tariq Ahamad
semanticscholar   +4 more sources

NAODV-Distributed Packet Dropping Attack Detection in MANETs [PDF]

open access: bronzeInternational Journal of Computer Applications, 2013
ad hoc network (MANET) is a self configuring network in which mobile nodes are connected by wireless link. Communication in MANET is done with the help of cooperation of nodes in the network. Due to its intrinsic properties like dynamic network topology, open medium, lack of central monitoring system, these are vulnerable to several attacks.
Bobby SharmaKakoty   +2 more
openalex   +2 more sources

Detection and Isolation of Packet Dropping Attacker in MANETs [PDF]

open access: hybridInternational Journal of Advanced Computer Science and Applications, 2013
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs.
Ahmed F. Mohamed   +3 more
openalex   +3 more sources

DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM [PDF]

open access: yesJurnal Ilmu Komputer dan Informasi, 2013
In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop
Ahmad Sanmorino, Setiadi Yazid
doaj   +5 more sources

A distributed protocol for detection of packet dropping attack in mobile ad hoc networks [PDF]

open access: green2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 2007
7 pages, 9 figures, 1 table. In Proceedings of the International Conference on Telecommunications and Malaysian International Conference on Communications (ICT-MICC'07), May 14-17, Penang, Malaysia. Paper ID: 74, Track: 3: Ad Hoc Routing and Protocols.
Jaydip Sen   +4 more
openalex   +5 more sources

A Novel Routing Technique against Packet Dropping Attack in Adhoc Networks [PDF]

open access: greenJournal of Computer Science, 2008
Problem Statement: Mobile adhoc networks (MANETs) were extensively used in defense and rescue applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. This dynamic property of MANET has rendered it vulnerable to various security attacks.
N. Bhalaji   +2 more
openalex   +3 more sources

A flying ad-hoc network dataset for early time series classification of grey hole attacks [PDF]

open access: yesScientific Data
Flying ad-hoc networks (FANETs) consist of multiple unmanned aerial vehicles (UAVs) that rely on multi-hop routes for communication. These routes are particularly susceptible to grey hole attacks, necessitating swift and accurate defence to preserve the ...
Charles Hutchins   +3 more
doaj   +2 more sources

Detection of Packet Dropping Attack Based on Evidence Fusion in IoT Networks [PDF]

open access: goldSecurity and Communication Networks, 2022
Internet of Things (IoT) is widely used in environmental monitoring, smart healthcare, and other fields. Due to its distributed nature, IoT is vulnerable to various internal attacks. One of these attacks is the packet-dropping attack, which is very harmful.
Weichen Ding   +4 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy