Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. [PDF]
Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole. During this they take a path which is the shortest for the place where it has to reach. During sending of message two types of attacks are generally seen such as the blackhole
Shukla M, Joshi BK, Singh U.
europepmc +4 more sources
A wormhole attack detection method for tactical wireless sensor networks [PDF]
Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology.
Ke Zhang
doaj +3 more sources
A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)
Mobile Ad-hoc Networks (MANET) are decentralized wireless networks that communicate without pre-existing infrastructure. MANETs are vulnerable to the most popular types of attacks and threats, such as wormhole attacks.
Muhannad Tahboush, Mary Agoyi
doaj +3 more sources
Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks [PDF]
Wireless ad-hoc networks operate independently of existing infrastructure, using devices like access points to connect end-user computing devices. Current methods face issues such as low detection accuracy, structural deviation, and extended processing ...
Jagadeesan Srinivasan
doaj +2 more sources
Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions [PDF]
The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographic measures and derail the entire communication network.
David Samuel Bhatti +5 more
doaj +2 more sources
Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme [PDF]
VANET (Vehicular Ad-hoc Network) is a developing technology, which is a combination of cellular technology, ad-hoc network & wireless LAN to improve the safety of vehicle as well as driver.
Shahjahan Ali +2 more
doaj +1 more source
Analysis and Countermeasures of Wormhole and Sinkhole Attacks in WBAN
Wireless Body Area Network (WBAN) is a promising technology that is having a significant number of applications in healthcare. Despite having several benefits, WBAN is susceptible to several security attacks, particularly related to the node misbehavior
Aisha Kanwal
doaj +1 more source
Geographic wormhole detection in wireless sensor networks. [PDF]
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs.
Mehdi Sookhak +7 more
doaj +1 more source
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or ...
Honglong Chen +3 more
doaj +2 more sources
Secure Localization Method Based on Consistency of RSSI in Wireless Sensor Network [PDF]
Wireless Sensor Network(WSN) is often deployed in hostile environments,in which malicious attackers can easily disrupt the nodes’ localization procedure to challenge the WSN-based applications.A new method of secure unknown node localization is proposed ...
ZHU Qingqing,YANG Yubin,LIU Na,MA Qiuhuan
doaj +1 more source

