Results 91 to 100 of about 4,734 (200)

Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Traditional routing protocols are quite vulnerable under the attacks from both external and internal attackers. In this work, we examine the impact of a wide variety of attacks in malicious wireless sensor networks scenario.
Chen Lyu   +4 more
doaj   +1 more source

ZONE BASED PATH ROUTING APPROACH FOR THE DETECTION AND PREVENTION OF MALICIOUS BEHAVIOUR OF THE NODE IN MANET

open access: yesICTACT Journal on Communication Technology, 2016
Mobile Ad-hoc Network (MANET) is one of the important research areas. MANET is a cluster of movable nodes that communicate without any wired connection.
Akansha Shrivastava, Ekta Chauhan
doaj  

Wormhole Attack Mitigation in Wireless Network Using Propagation Delay

open access: yesJournal of Cybersecurity Education, Research & Practice
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to ...
Harry May, Travis Atkison
doaj  

Real-Time Detection and Response to Wormhole and Sinkhole Attacks in Wireless Sensor Networks

open access: yesTechnologies
Wireless sensor networks have become a vital technology that is extensively applied across multiple industries, including agriculture, industrial operations, and smart cities, as well as residential smart homes and environmental monitoring systems ...
Tamara Zhukabayeva   +5 more
doaj   +1 more source

DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks

open access: yesJournal of Communications Software and Systems, 2006
Data transmission in a mobile ad hoc network is performed within an untrusted wireless environment. It is subjected to many kinds of security attacks. In a wormhole attack, two malicious nodes work together to tunnel packets from one to the other, making
Hon Sun Chiu   +2 more
doaj  

Leveraging Propagation Delay for Wormhole Detection in Wireless Networks

open access: yesJournal of Cybersecurity Education, Research & Practice
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity.
Harry May, Travis Atkison
doaj  

ABCD: advanced blockchain DSR algorithm for MANET to mitigate the different security threats

open access: yesEURASIP Journal on Wireless Communications and Networking
Mobile ad hoc networks (MANETs) facilitate data communication across multiple nodes and hop stations, characterized by their dynamic topology. This inherent flexibility, however, makes MANETs vulnerable to various security threats, notably blackhole and ...
Sayan Majumder   +2 more
doaj   +1 more source

Distributed Wormhole Attack Mitigation Technique in WSNs [PDF]

open access: yesInternational Journal of Computer Network and Information Security, 2019
Sharada Kori   +2 more
openaire   +1 more source

Wormhole Detection Algorithm: To Detect Wormhole Attacks Efficiently in Wireless Networks

open access: yesInternational Journal of Security and Its Applications, 2016
R. Regan   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy