Results 151 to 160 of about 4,734 (200)
Some of the next articles are maybe not open access.
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications, 2006As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides ...
null Yih-Chun Hu +2 more
openaire +3 more sources
Wormhole Attacks in IoT Based Networks
2021 6th International Conference on Computer Science and Engineering (UBMK), 2021Wireless sensor networks (WSNs) from the IoT subset consist of small sensor nodes with limited energy. Such nodes are capable of monitoring physical conditions and transmitting information between nodes without the need for physical media. Due to the lack of central authority and the deployment of random nodes on the network, WSNs and IoTs are prone to
DENER, MURAT, Tatar, Ekin Ecem
openaire +3 more sources
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016
A mobile ad hoc network or MANET are those wireless networks which posses no infrastructure which are connected by the wireless nodes. And these nodes are generally mobile and the connectionless links are used basically to connect these nodes and these nodes have the capability to self organize and self configure and self arrangement capability.
Nitika Gupta, Shailendra Narayan Singh
openaire +1 more source
A mobile ad hoc network or MANET are those wireless networks which posses no infrastructure which are connected by the wireless nodes. And these nodes are generally mobile and the connectionless links are used basically to connect these nodes and these nodes have the capability to self organize and self configure and self arrangement capability.
Nitika Gupta, Shailendra Narayan Singh
openaire +1 more source
Defending against Wormhole Attack in MANET
2015 Fifth International Conference on Communication Systems and Network Technologies, 2015In the generation of wireless communication, MANET has become an undividable and acceptable part for communication for mobile equipments. Therefore, interest in research of MANET has been increasing since last several years. Security is a very challenging issue in MANET as it is without infrastructure and self-governing.
Anal Patel, Nimisha Patel, Rajan Patel
openaire +1 more source
Wormhole attack: A new detection technique
2012 International Conference on Emerging Technologies, 2012The advancement in wireless technologies and the high availability of wireless equipment in everyday devices is a factor in the success of infrastructure-less networks. MANETs are becoming more and more common due to their ease of deployment. The high availability of such networks and the lack in security measures of their routing protocols are ...
Zubair Ahmed Khan, M. Hasan Islam
openaire +1 more source
Detecting wormhole attacks in wireless networks
2006 2nd IEEE Workshop on Wireless Mesh Networks, 2006We study and propose a novel algorithm for detecting Wormhole Attacks in wireless ad hoc and sensor networks. The algorithm uses only local connectivity information and utilizes disk packing argument to detect such attacks. The success of the detection algorithm depends on the density of nodes in the network.
Ritesh Maheshwari, Tie Gao, Samir Das
openaire +1 more source
Preventing Wormhole Attacks in Mobile Commerce
2009 IEEE International Conference on e-Business Engineering, 2009Currently, several researches have concentrated on the new or vital security requirements of mobile commerce. However, some recent studies asserted a particular serious attack, called wormhole attack, that mainly targeting in a wireless-based system may also occur in the mobile commerce systems.
Hao-Ting Pai, Fan Wu
openaire +1 more source
Locating the Attacker of Wormhole Attack by Using the Honeypot
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task.
T. Divya Sai Keerthi, Pallapa Venkataram
openaire +1 more source
Recovering system recital by noticing wormhole attack
2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), 2016The main aim of this paper is to improve the wireless system recital. Though there are many safeties measure hinder its wide use in common. Also the well-known pollution attacks, here is one more stern hazard, that of wormhole attacks, which weaken the recital increase of network coding.
A. Akila, D. Mahalakshmi, C. Saranya
openaire +1 more source
Preventing Wormhole Attacks in Wireless Mesh Networks
Applied Mechanics and Materials, 2013In a wireless mesh network, the need for cooperation among wireless nodes to relay each others packets exposes the network to a wide range of security threats. A particularly devastating type of threats is the so-called wormhole attacks. In order to defense against the attack, a type of wormhole attack model and a watch nodes-based wormhole attack ...
Liang Yu Luan +3 more
openaire +1 more source

