Results 81 to 90 of about 4,734 (200)

A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET

open access: yesSensors, 2009
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment
Chi-Sung Laih   +2 more
doaj   +1 more source

DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS

open access: yesHERALD OF SCIENCE OF S SEIFULLIN KAZAKH AGRO TECHNICAL UNIVERSITY, 2021
Wireless sensor networks (WSN), consisting of wireless sensors and control devices and methods of self-organization using intelligent algorithms, demonstrate broad prospects. WSNs are subject to numerous types of threats and attacks. One of which is a wormhole attack.
openaire   +2 more sources

Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Wormhole attack is one of the severe threats to wireless sensor and ad hoc networks. Most of the existing countermeasures either require specialized hardware or demand high network overheads in order to capture the specific symptoms induced by the ...
Li Lu   +3 more
doaj   +1 more source

Secure energy efficient routing protocol for wireless sensor network

open access: yesFoundations of Computing and Decision Sciences, 2016
The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task.
Das Ayan Kumar   +2 more
doaj   +1 more source

Wormhole Attack Detection In Wireless Sensor Networks

open access: yes, 2008
{"references": ["I.F. Akylidiz, W.Su, Y. Sankarubramaniam, E. Cayiric. A Survey on\nSensor Networks. IEEE Computer Magazine. August 2002. pp.102-114.", "L. Butty\u251c\u00edn, L. D\u251c\u2502ra, I. Vajda, Statistical Wormhole Detection in Sensor\nNetworks, Second European Workshop on Security and Privacy in Ad\nHoc and Sensor Networks (ESAS 2005 ...
Zaw Tun, Aung Htein Maw
openaire   +1 more source

Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning. [PDF]

open access: yesSensors (Basel), 2022
Zahra F   +5 more
europepmc   +1 more source

Trust System- and Multiple Verification Technique-Based Method for Detecting Wormhole Attacks in MANETs

open access: yesIEEE Access
The proliferation of wireless mobile devices has resulted in mobile ad hoc network (MANET) technologies, which enable the formation of networks without infrastructure assistance, gaining increased attention.
Joonsu Ryu, Sungwook Kim
doaj   +1 more source

Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

open access: yesThe Scientific World Journal, 2015
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers.
Udaya Suriya Raj Kumar Dhamodharan   +1 more
doaj   +1 more source

Context-Aware Intrusion Detection in Vehicular Communication Networks: Enhanced Attack Modeling and Dataset

open access: yesApplied Artificial Intelligence
Vehicular Communication Networks (VCNs) are essential for autonomous vehicles and Intelligent Transportation Systems but face challenges in security vulnerabilities and data sparsity.
Muhammad Danish Khan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy