Results 161 to 170 of about 4,734 (200)
Some of the next articles are maybe not open access.
Defending wormhole attack in APS DV-hop
2008 Third International Conference on Communications and Networking in China, 2008DV-hop is one position algorithm of APS, which uses hop count to estimate the distances to the special nodes with known position. DV-hop is very cheap and convenience to the network with limited resource. But its security is not taken into account in the original design.
Zhu Bin, null Liao Jun'guo, Zhang Huifu
openaire +1 more source
Wormhole attack detection in wireless sensor networks
2016 SAI Computing Conference (SAI), 2016A wireless sensor network (WSN) consists of a large number of sensor nodes with limited batteries, the sensoring devices are deployed randomly on a zone to collect data. WSNs are threatened by several malicious behaviors caused by some nodes. The impact of such behaviors can be serious, even fatal, due to the collaborative nature of nodes in a network ...
Mostefa Bendjima, Mohammed Feham
openaire +1 more source
Effect of Wormhole Attacks on MANET
2019Mobile Ad hoc Network (MANET) is an infrastructure-less and self-organizing network of autonomous mobile nodes with wireless interfaces to construct a temporary wireless network using no dedicated routers, so the communication channels are freely accessible by the legitimate as well as the non-legitimate users.
Harsh Nath Jha +2 more
openaire +1 more source
Wormhole attack in mobile ad-hoc networks
2016 Symposium on Colossal Data Analysis and Networking (CDAN), 2016Wireless networks are playing important role for development and ease of use of human society. It also gets a lot of attention from research community towards the betterment of applications. A wide range of applications make it very popular and backbone of technology system i.e. GSM, Bluetooth, Wi-Fi etc.
Madhu Sharma, Ashish Jain, Shweta Shah
openaire +1 more source
Preventing wormhole attacks using physical layer authentication
2012 IEEE Wireless Communications and Networking Conference (WCNC), 2012Mobile ad-hoc networks (MANETs) are a key enabler of pervasive computing. Constrained resources in mobile stations make it critical for nodes to be able to cooperate to enhance communication and computation capabilities. However, the wireless and dynamic nature of the links presents easy attack vectors for adversaries.
Shalabh Jain, John S. Baras
openaire +1 more source
Wormhole Attack Detection in Wireless Sensor Network
2018 International Conference on Inventive Research in Computing Applications (ICIRCA), 2018A large number of nodes are deployed in the field, called sensor field. Sensor nodes are resource limited devices. Nodes are deployed through airplane or other vehicles. Nodes are not personally monitored. An attacker can easily launch an attack. Therefore, security is very crucial for wireless sensor network. Security comes from attacks.
Mousam A. Patel, Manish M. Patel
openaire +1 more source
Sensitivity analysis on AODV with Wormhole attack
2016 2nd International Conference on Next Generation Computing Technologies (NGCT), 2016Mobile Ad-Hoc Networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and does not have any centralized control in the network. MANET have no clear way of defense mechanism to protect network from security threats, thereby making this network accessible to both legitimate node and authorized node.
Pratima Sarkar +3 more
openaire +1 more source
Enhancement of frequency-based wormhole attack detection
2011 - MILCOM 2011 Military Communications Conference, 2011Mobile Ad Hoc Networks (MANETs) have been seen as a key tactical communication technology. However, one of the most severe attacks in MANETs, the wormhole attack remains a sizable challenge. Most existing wormhole detection techniques rely on specialized hardware such as directional antennas, GPS, or high precision clocks, which can limit their ...
Ronggong Song, Peter C. Mason, Ming Li
openaire +1 more source
Network wormhole attacks without a traditional wormhole
Ad Hoc Networks, 2023Nadav Schweitzer +2 more
openaire +1 more source
A novel approach for avoiding wormhole attacks in VANET
2009 First Asian Himalayas International Conference on Internet, 2009Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by ...
Seyed Mohammad Safi +2 more
openaire +1 more source

