Results 11 to 20 of about 4,734 (200)
A distributed scheme to detect wormhole attacks in mobile wireless sensor networks [PDF]
Due to mostly being unattended, sensor nodes become open to physical attacks such as wormhole attack, which is our focus in this paper. Various solutions are proposed for wormhole attacks in sensor networks, but only a few of them take mobility of sensor
Levi, Albert, Simsek, Oya, Şimşek, Oya
core +2 more sources
Review Paper on Wormhole Attack
A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without negotiating any cryptographic techniques over the network. Thus, it is challenging to defend against this attack. In this
Dinesh Singh, Garima Kadian
openaire +1 more source
Security in Wireless Sensor Networks: Issues and Challenges [PDF]
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core +3 more sources
A lightweight technique for detection and prevention of wormhole attack in MANET [PDF]
A mobile ad-hoc network (MANET) is an ordinary and self-orbiting communication network that is capable of managingmobile nodes. Many proposed protocols on MANET address its vulnerability against different threats and attacks.
Zulfiqar Zardari +4 more
doaj +1 more source
Defending against wormhole attack in OLSR
OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF (Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast.
Hong Liang, Hong Fan, Fu Cai
openaire +1 more source
A-VIP: Anonymous Verification and Inference of Positions in Vehicular Networks [PDF]
MiniconferenceInternational audienceKnowledge of the location of vehicles and tracking of the routes they follow are a requirement for a number of applications, including e-tolling and liability attribution in case of accidents.
Borgiattino, Carlo +5 more
core +3 more sources
Analysis of wormhole intrusion attacks in MANETS [PDF]
Wormhole refers to an attack on MANET routing protocols in which colluding nodes create an illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors but are actually distant from one another. Our focus in this paper is a particular form of the wormhole attack called the self-contained in-band wormhole.
Viren Mahajan +2 more
openaire +1 more source
Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks
Nodes in wireless sensor networks (WSN) are resource and energy-constrained because they are generally batteries powered and therefore have limited computational capability. Due to the less secure environment in WSN, some malicious nodes at one point can
Ohida Rufai Ahutu, Hosam El-Ocla
doaj +1 more source
Secure Routing in Wireless Mesh Networks [PDF]
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers ...
Sen, Jaydip
core +3 more sources
Quarantine region scheme to mitigate spam attacks in wireless sensor networks [PDF]
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink.
Cayirci, Erdal +5 more
core +1 more source

