Results 1 to 10 of about 4,734 (200)

Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. [PDF]

open access: yesWirel Pers Commun, 2021
Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole. During this they take a path which is the shortest for the place where it has to reach. During sending of message two types of attacks are generally seen such as the blackhole
Shukla M, Joshi BK, Singh U.
europepmc   +4 more sources

A wormhole attack detection method for tactical wireless sensor networks [PDF]

open access: yesPeerJ Computer Science, 2023
Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology.
Ke Zhang
doaj   +3 more sources

A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)

open access: yesIEEE Access, 2021
Mobile Ad-hoc Networks (MANET) are decentralized wireless networks that communicate without pre-existing infrastructure. MANETs are vulnerable to the most popular types of attacks and threats, such as wormhole attacks.
Muhannad Tahboush, Mary Agoyi
doaj   +3 more sources

Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks [PDF]

open access: yesScientific Reports
Wireless ad-hoc networks operate independently of existing infrastructure, using devices like access points to connect end-user computing devices. Current methods face issues such as low detection accuracy, structural deviation, and extended processing ...
Jagadeesan Srinivasan
doaj   +2 more sources

Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions [PDF]

open access: yesScientific Reports
The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographic measures and derail the entire communication network.
David Samuel Bhatti   +5 more
doaj   +2 more sources

Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme [PDF]

open access: yesJournal of Information Technology Management, 2022
VANET (Vehicular Ad-hoc Network) is a developing technology, which is a combination of cellular technology, ad-hoc network & wireless LAN to improve the safety of vehicle as well as driver.
Shahjahan Ali   +2 more
doaj   +1 more source

Analysis and Countermeasures of Wormhole and Sinkhole Attacks in WBAN

open access: yesJISR on Computing, 2022
Wireless Body Area Network (WBAN) is a promising technology that is having a significant number of applications in healthcare. Despite having several benefits, WBAN is susceptible to several security attacks, particularly related to the node misbehavior
Aisha Kanwal
doaj   +1 more source

Geographic wormhole detection in wireless sensor networks. [PDF]

open access: yesPLoS ONE, 2015
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs.
Mehdi Sookhak   +7 more
doaj   +1 more source

A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

open access: yesEURASIP Journal on Wireless Communications and Networking, 2010
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or ...
Honglong Chen   +3 more
doaj   +2 more sources

Secure Localization Method Based on Consistency of RSSI in Wireless Sensor Network [PDF]

open access: yesJisuanji gongcheng, 2016
Wireless Sensor Network(WSN) is often deployed in hostile environments,in which malicious attackers can easily disrupt the nodes’ localization procedure to challenge the WSN-based applications.A new method of secure unknown node localization is proposed ...
ZHU Qingqing,YANG Yubin,LIU Na,MA Qiuhuan
doaj   +1 more source

Home - About - Disclaimer - Privacy