Results 11 to 20 of about 4,734 (200)

A distributed scheme to detect wormhole attacks in mobile wireless sensor networks [PDF]

open access: yes, 2011
Due to mostly being unattended, sensor nodes become open to physical attacks such as wormhole attack, which is our focus in this paper. Various solutions are proposed for wormhole attacks in sensor networks, but only a few of them take mobility of sensor
Levi, Albert, Simsek, Oya, Şimşek, Oya
core   +2 more sources

Review Paper on Wormhole Attack

open access: yesInternational Journal of Computer Applications, 2015
A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without negotiating any cryptographic techniques over the network. Thus, it is challenging to defend against this attack. In this
Dinesh Singh, Garima Kadian
openaire   +1 more source

Security in Wireless Sensor Networks: Issues and Challenges [PDF]

open access: yes, 2006
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core   +3 more sources

A lightweight technique for detection and prevention of wormhole attack in MANET [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2021
A mobile ad-hoc network (MANET) is an ordinary and self-orbiting communication network that is capable of managingmobile nodes. Many proposed protocols on MANET address its vulnerability against different threats and attacks.
Zulfiqar Zardari   +4 more
doaj   +1 more source

Defending against wormhole attack in OLSR

open access: yesGeo-spatial Information Science, 2006
OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF (Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast.
Hong Liang, Hong Fan, Fu Cai
openaire   +1 more source

A-VIP: Anonymous Verification and Inference of Positions in Vehicular Networks [PDF]

open access: yes, 2013
MiniconferenceInternational audienceKnowledge of the location of vehicles and tracking of the routes they follow are a requirement for a number of applications, including e-tolling and liability attribution in case of accidents.
Borgiattino, Carlo   +5 more
core   +3 more sources

Analysis of wormhole intrusion attacks in MANETS [PDF]

open access: yesMILCOM 2008 - 2008 IEEE Military Communications Conference, 2008
Wormhole refers to an attack on MANET routing protocols in which colluding nodes create an illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors but are actually distant from one another. Our focus in this paper is a particular form of the wormhole attack called the self-contained in-band wormhole.
Viren Mahajan   +2 more
openaire   +1 more source

Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks

open access: yesIEEE Access, 2020
Nodes in wireless sensor networks (WSN) are resource and energy-constrained because they are generally batteries powered and therefore have limited computational capability. Due to the less secure environment in WSN, some malicious nodes at one point can
Ohida Rufai Ahutu, Hosam El-Ocla
doaj   +1 more source

Secure Routing in Wireless Mesh Networks [PDF]

open access: yes, 2011
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers ...
Sen, Jaydip
core   +3 more sources

Quarantine region scheme to mitigate spam attacks in wireless sensor networks [PDF]

open access: yes, 2006
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink.
Cayirci, Erdal   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy