Results 161 to 170 of about 4,734 (200)
Some of the next articles are maybe not open access.

Defending wormhole attack in APS DV-hop

2008 Third International Conference on Communications and Networking in China, 2008
DV-hop is one position algorithm of APS, which uses hop count to estimate the distances to the special nodes with known position. DV-hop is very cheap and convenience to the network with limited resource. But its security is not taken into account in the original design.
Zhu Bin, null Liao Jun'guo, Zhang Huifu
openaire   +1 more source

Wormhole attack detection in wireless sensor networks

2016 SAI Computing Conference (SAI), 2016
A wireless sensor network (WSN) consists of a large number of sensor nodes with limited batteries, the sensoring devices are deployed randomly on a zone to collect data. WSNs are threatened by several malicious behaviors caused by some nodes. The impact of such behaviors can be serious, even fatal, due to the collaborative nature of nodes in a network ...
Mostefa Bendjima, Mohammed Feham
openaire   +1 more source

Effect of Wormhole Attacks on MANET

2019
Mobile Ad hoc Network (MANET) is an infrastructure-less and self-organizing network of autonomous mobile nodes with wireless interfaces to construct a temporary wireless network using no dedicated routers, so the communication channels are freely accessible by the legitimate as well as the non-legitimate users.
Harsh Nath Jha   +2 more
openaire   +1 more source

Wormhole attack in mobile ad-hoc networks

2016 Symposium on Colossal Data Analysis and Networking (CDAN), 2016
Wireless networks are playing important role for development and ease of use of human society. It also gets a lot of attention from research community towards the betterment of applications. A wide range of applications make it very popular and backbone of technology system i.e. GSM, Bluetooth, Wi-Fi etc.
Madhu Sharma, Ashish Jain, Shweta Shah
openaire   +1 more source

Preventing wormhole attacks using physical layer authentication

2012 IEEE Wireless Communications and Networking Conference (WCNC), 2012
Mobile ad-hoc networks (MANETs) are a key enabler of pervasive computing. Constrained resources in mobile stations make it critical for nodes to be able to cooperate to enhance communication and computation capabilities. However, the wireless and dynamic nature of the links presents easy attack vectors for adversaries.
Shalabh Jain, John S. Baras
openaire   +1 more source

Wormhole Attack Detection in Wireless Sensor Network

2018 International Conference on Inventive Research in Computing Applications (ICIRCA), 2018
A large number of nodes are deployed in the field, called sensor field. Sensor nodes are resource limited devices. Nodes are deployed through airplane or other vehicles. Nodes are not personally monitored. An attacker can easily launch an attack. Therefore, security is very crucial for wireless sensor network. Security comes from attacks.
Mousam A. Patel, Manish M. Patel
openaire   +1 more source

Sensitivity analysis on AODV with Wormhole attack

2016 2nd International Conference on Next Generation Computing Technologies (NGCT), 2016
Mobile Ad-Hoc Networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and does not have any centralized control in the network. MANET have no clear way of defense mechanism to protect network from security threats, thereby making this network accessible to both legitimate node and authorized node.
Pratima Sarkar   +3 more
openaire   +1 more source

Enhancement of frequency-based wormhole attack detection

2011 - MILCOM 2011 Military Communications Conference, 2011
Mobile Ad Hoc Networks (MANETs) have been seen as a key tactical communication technology. However, one of the most severe attacks in MANETs, the wormhole attack remains a sizable challenge. Most existing wormhole detection techniques rely on specialized hardware such as directional antennas, GPS, or high precision clocks, which can limit their ...
Ronggong Song, Peter C. Mason, Ming Li
openaire   +1 more source

Network wormhole attacks without a traditional wormhole

Ad Hoc Networks, 2023
Nadav Schweitzer   +2 more
openaire   +1 more source

A novel approach for avoiding wormhole attacks in VANET

2009 First Asian Himalayas International Conference on Internet, 2009
Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by ...
Seyed Mohammad Safi   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy