Results 171 to 180 of about 4,734 (200)
Some of the next articles are maybe not open access.
Reviewing the impact of wormhole attack in MANET
2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), 2016Security of different networks has always been a primary concern as its necessary to protect the resources being shared and communication being done among the legitimate users. If we let down our safeguards, an attacker can transform the routing protocol and interrupt the network operations through mechanisms such as packet drops, flooding, data ...
Dhruvi Sharma, Rakesh Kumar
openaire +1 more source
A Wormhole Attack in Mobile Ad-hoc Network
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016In Mobile Ad hoc Network (MANET) is a self-organizing session of communication between wireless mobile nodes build up dynamically regardless of any established infrastructure or central authority. In MANET each node behaves as a sender, receiver and router which are connected directly with one another if they are within the range of communication or ...
Ashka Shastri, Jignesh Joshi
openaire +1 more source
Wormhole Attack Detection using Energy Model in MANETs
2019 2nd International Conference on Power and Embedded Drive Control (ICPEDC), 2019The mobile ad-hoc networks comprised of nodes that are communicated through dynamic request and also by static table driven technique. The dynamic route discovery in AODV routing creates an unsecure transmission as well as reception. The reason for insecurity is the route request is given to all the nodes in the network communication.
S Gayathri +5 more
openaire +1 more source
Wormhole Attack Detection Technques In MANET
2023 International Conference on Business Analytics for Technology and Security (ICBATS), 2023Muhammad Bashir +4 more
openaire +1 more source
Wormhole Attacks Mitigation in Ad Hoc Networks
2011 Sixth International Conference on Availability, Reliability and Security, 2011There are many unsolved problems in ad hoc networks; security being one of the major concerns. The wormhole attack is among the most threatening and dangerous attacks on these types of networks. During the attack a malicious node captures packets from one location in the network, and tunnels them to another distant malicious node, which replays them ...
openaire +1 more source
Effects of Wormhole Attack on Routing Topology
Проблеми телекомунікацій, 2022The article is devoted to investigating the effects of wormhole attack on routing topology in Wireless Sensor Networks (WSNs). Currently, WSNs are increasingly vulnerable to numerous security attacks. One of the major attacks affecting WSNs involves a wormhole attack where attackers receive packets at a single end in the network and tunnel ...
openaire +1 more source
Detection of Wormhole Attack in Wireless Sensor Networks
2016Although Secure routing is the demand of the hour in the application of wireless sensor networks (WSN), secure routing is a challenge in itself due to the inherently limited capacities of sensor nodes. Routing attacks are a major challenge in the process of designing of effective and robust security mechanisms for WSNs. This main focus of this paper is
Jyoti Yadav, Mukesh Kumar
openaire +1 more source
Trusted Routing in AODV Protocol Against Wormhole Attack
2012This research aims to develop an enhanced version of AODV including trust and reputation that will ensure the transmission of messages in a secure way avoiding wormhole attackers in the network. Firstly, wormhole attackers are identified depending on their transmission related misbehavior with respect to other nodes in the network.
Swarnali Hazra, S. K. Setua
openaire +1 more source
Analysis of Wormhole Attacks in Wireless Sensor Networks
2018Owing to their deployment characteristics, wireless sensor networks are vulnerable to many more attacks than wired sensor networks. The wormhole attack is a serious threat against wireless sensor networks. Launching this type of attack is easy for an attacker; it requires no breaking of a cryptographic mechanism.
Manish Patel +2 more
openaire +1 more source
Wormhole Attack Detection System for IoT Network: A Hybrid Approach
Wireless Personal Communications, 2021Snehal A Bhosale
exaly

