Results 21 to 30 of about 4,734 (200)
Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks [PDF]
Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme.
Liang-yu Luan +3 more
doaj +1 more source
Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks
Wormhole attack is a severe attack that can be easily launched by a pair of external attackers in hostile wireless sensor networks. In the wormhole attack, an attacker sniffs packets at one point in the network, and tunnels them through the wormhole link
Honglong Chen +4 more
doaj +1 more source
Implementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Devices
One of the most dangerous threats to Wireless Sensor Networks (WSN) are wormhole attacks, due to their capacity to manipulate routing and application data in real time and cause important damages to the integrity, availability, and confidentiality of ...
Julián Ramírez Gómez +2 more
doaj +1 more source
CREDND: A Novel Secure Neighbor Discovery Algorithm for Wormhole Attack
As nodes' characteristics that they are self-governed and resource-limited, wireless sensor networks (WSNs) face potential threats due to various attacks, among which the most threatening attack is wormhole attack.
Xiao Luo +6 more
doaj +1 more source
The increasing use of wireless communication and IoT devices has raised concerns about security, particularly with regard to attacks on the Routing Protocol for Low-Power and Lossy Networks (RPL), such as the wormhole attack.
Sarmad Javed +6 more
doaj +1 more source
A MODIFIED AODV PROTOCOL TO MITIGATE COMBINED IMPACT OF MULTIPLE ATTACKS IN MANET [PDF]
Since past two decades MANET researchers have focused on providing security solution to MANET to protect them from various network attacks. Most of the recent security approaches are restricted to address specific attacks only.
Monika Dangore , Hare Ram Sah
doaj +1 more source
Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core +1 more source
Research on wormhole attacks in wireless mesh networks
In order to detect the wormhole attacks effectively in wireless mesh network,a wormhole attack model ac-cording to the MR-LQSR(multi-radio link-quality source routing) protocol proposed by Microsoft was presented.Then,the characteristics of wireless mesh
FU Ying-fang1 +3 more
doaj +2 more sources
Gas of wormholes: a possible ground state of Quantum Gravity [PDF]
In order to gain insight into the possible Ground State of Quantized Einstein's Gravity, we have derived a variational calculation of the energy of the quantum gravitational field in an open space, as measured by an asymptotic observer living in an ...
B. S. DeWitt +13 more
core +2 more sources
An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack [PDF]
MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build.
ZUBAIR AHMED KHAN +2 more
doaj

