Results 31 to 40 of about 4,734 (200)

A SURVEY ON DELAY AND NEIGHBOR NODE MONITORING BASED WORMHOLE ATTACK PREVENTION AND DETECTION

open access: yesICTACT Journal on Communication Technology, 2016
In Mobile Ad-hoc Networks (MANET), network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in
Sudhir T Bagade, Vijay T Raisinghani
doaj   +1 more source

Topological Comparison-based Wormhole Detection for Manet [PDF]

open access: yes, 2015
Wormhole attack is considered one of the mostthreatening security attacks for mobile ad hocnetworks (MANET). In a wormhole attack, a tunnelis setup in advance between two colluders.
Alan, M. R. (Mohammad)   +1 more
core  

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Advances in Solid‐Phase Processing Techniques: Innovations, Applications, and Future Perspectives

open access: yesAdvanced Materials Technologies, Volume 11, Issue 9, 6 May 2026.
Based on practical manufacturing challenges, this review examines advanced solid‐phase processing techniques that overcome the inherent limitations of conventional melting‐based and traditional solid‐phase manufacturing, enabling the production of higher‐performance components at reduced cost through process innovation and improved supply‐chain ...
Tianhao Wang
wiley   +1 more source

Fast and Efficient Distance based External Wormhole Detection and Prevention System (FEDEWDPS)

open access: yesMajlesi Journal of Electrical Engineering
In terms of applications and research, VANET (Vehicular Ad-hoc Networks) communication is becoming more popular. Existing VANET communication protocols try to improve network performance but fail to consider security issues.
R Prathap Kuma   +2 more
doaj   +1 more source

Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods [PDF]

open access: yes, 2014
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities.
Dooley, Laurence S.   +3 more
core  

A Novel Hybrid Recruit Simulated Annealing and Rat Swarm Optimization Algorithm for Permutation Flow Shop Scheduling

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Rat swarm position update mechanism in HRSA‐RSO, illustrating the collective exploration behavior around the prey target (A*, B*). ABSTRACT The permutation flow shop scheduling problem (PFSSP) is a classical NP‐hard problem that aims to determine an optimal job sequence across machines to minimize makespan.
Mourad Mzili   +5 more
wiley   +1 more source

Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks

open access: yesIEEE Access, 2019
A wireless sensor network consists of sensors having autonomous wireless communication with the ability to sense their surrounding conditions and an ability to connect to the Internet through a base station.
Wateen A. Aliady, Saad A. Al-Ahmadi
doaj   +1 more source

Hitchhiker's Guide to the Swampland: The Cosmologist's Handbook to the String‐Theoretical Swampland Programme

open access: yesFortschritte der Physik, Volume 74, Issue 4, April 2026.
Abstract String theory has strong implications for cosmology, implying the absence of a cosmological constant, ruling out single‐field slow‐roll inflation, and that black holes decay. The origins of these statements are elucidated within the string‐theoretical swampland programme.
Kay Lehnert
wiley   +1 more source

Secure localization scheme against wormhole attack for wireless sensor networks

open access: yesTongxin xuebao, 2015
As one of the key technologies in wireless sensor networks (WSN), localization is the basis of many WSN-based applications. However, WSNs are often deployed in the hostile environment, in which the attackers can eas-ily disrupt the localization procedure
Hong-long CHEN   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy