Results 31 to 40 of about 4,734 (200)
A SURVEY ON DELAY AND NEIGHBOR NODE MONITORING BASED WORMHOLE ATTACK PREVENTION AND DETECTION
In Mobile Ad-hoc Networks (MANET), network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in
Sudhir T Bagade, Vijay T Raisinghani
doaj +1 more source
Topological Comparison-based Wormhole Detection for Manet [PDF]
Wormhole attack is considered one of the mostthreatening security attacks for mobile ad hocnetworks (MANET). In a wormhole attack, a tunnelis setup in advance between two colluders.
Alan, M. R. (Mohammad) +1 more
core
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
Advances in Solid‐Phase Processing Techniques: Innovations, Applications, and Future Perspectives
Based on practical manufacturing challenges, this review examines advanced solid‐phase processing techniques that overcome the inherent limitations of conventional melting‐based and traditional solid‐phase manufacturing, enabling the production of higher‐performance components at reduced cost through process innovation and improved supply‐chain ...
Tianhao Wang
wiley +1 more source
Fast and Efficient Distance based External Wormhole Detection and Prevention System (FEDEWDPS)
In terms of applications and research, VANET (Vehicular Ad-hoc Networks) communication is becoming more popular. Existing VANET communication protocols try to improve network performance but fail to consider security issues.
R Prathap Kuma +2 more
doaj +1 more source
Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods [PDF]
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities.
Dooley, Laurence S. +3 more
core
Rat swarm position update mechanism in HRSA‐RSO, illustrating the collective exploration behavior around the prey target (A*, B*). ABSTRACT The permutation flow shop scheduling problem (PFSSP) is a classical NP‐hard problem that aims to determine an optimal job sequence across machines to minimize makespan.
Mourad Mzili +5 more
wiley +1 more source
Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks
A wireless sensor network consists of sensors having autonomous wireless communication with the ability to sense their surrounding conditions and an ability to connect to the Internet through a base station.
Wateen A. Aliady, Saad A. Al-Ahmadi
doaj +1 more source
Abstract String theory has strong implications for cosmology, implying the absence of a cosmological constant, ruling out single‐field slow‐roll inflation, and that black holes decay. The origins of these statements are elucidated within the string‐theoretical swampland programme.
Kay Lehnert
wiley +1 more source
Secure localization scheme against wormhole attack for wireless sensor networks
As one of the key technologies in wireless sensor networks (WSN), localization is the basis of many WSN-based applications. However, WSNs are often deployed in the hostile environment, in which the attackers can eas-ily disrupt the localization procedure
Hong-long CHEN +5 more
doaj +2 more sources

