Results 81 to 90 of about 4,734 (200)
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment
Chi-Sung Laih +2 more
doaj +1 more source
DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS
Wireless sensor networks (WSN), consisting of wireless sensors and control devices and methods of self-organization using intelligent algorithms, demonstrate broad prospects. WSNs are subject to numerous types of threats and attacks. One of which is a wormhole attack.
openaire +2 more sources
Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs
Wormhole attack is one of the severe threats to wireless sensor and ad hoc networks. Most of the existing countermeasures either require specialized hardware or demand high network overheads in order to capture the specific symptoms induced by the ...
Li Lu +3 more
doaj +1 more source
Secure energy efficient routing protocol for wireless sensor network
The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task.
Das Ayan Kumar +2 more
doaj +1 more source
DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output. [PDF]
Pramitarini Y +3 more
europepmc +1 more source
Wormhole Attack Detection In Wireless Sensor Networks
{"references": ["I.F. Akylidiz, W.Su, Y. Sankarubramaniam, E. Cayiric. A Survey on\nSensor Networks. IEEE Computer Magazine. August 2002. pp.102-114.", "L. Butty\u251c\u00edn, L. D\u251c\u2502ra, I. Vajda, Statistical Wormhole Detection in Sensor\nNetworks, Second European Workshop on Security and Privacy in Ad\nHoc and Sensor Networks (ESAS 2005 ...
Zaw Tun, Aung Htein Maw
openaire +1 more source
Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning. [PDF]
Zahra F +5 more
europepmc +1 more source
The proliferation of wireless mobile devices has resulted in mobile ad hoc network (MANET) technologies, which enable the formation of networks without infrastructure assistance, gaining increased attention.
Joonsu Ryu, Sungwook Kim
doaj +1 more source
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers.
Udaya Suriya Raj Kumar Dhamodharan +1 more
doaj +1 more source
Vehicular Communication Networks (VCNs) are essential for autonomous vehicles and Intelligent Transportation Systems but face challenges in security vulnerabilities and data sparsity.
Muhammad Danish Khan +3 more
doaj +1 more source

