نتایج جستجو برای: wormhole attack

تعداد نتایج: 82627  

Journal: :International Journal of Computer Applications 2016

Journal: :Computers, materials & continua 2022

Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over wireless sensor networks (WSNs). Wormhole are characterized as distributed passive that can destabilize or disable WSNs. The nature these makes them enormously challenging to detect. main objective find all possible ways in which how network’s broadcasting character transmission medium allows attacke...

Journal: :Int. J. Computational Intelligence Systems 2012
Liangyu Luan Yingfang Fu Peng Xiao Lingxi Peng

Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting, watch-nodes-based detection and identity-based cryptosystem are used. The simulation results a...

2014
J. Anne Shirley J. John Raybin Jose

A Wireless Sensor Network (WSN) consists of distributed an autonomous devices that monitors both physical and environmental conditions. Sensor Networks are used for weather prediction and measuring temperature, sound, wave, vibration, pressure etc. Sensor Networks suffer from various security attacks like (i) sink hole attack, (ii) black hole attack, (iii) wormhole attack and (iv) selective for...

2011
Oya Simsek Albert Levi

7 tions are proposed for wormhole attacks in sensor networks, but only a few of 8 them take mobility of sensor nodes into account. We propose a distributed 9 wormhole detection scheme for mobile wireless sensor networks in which mobility 10 of sensor nodes is utilized to estimate two network features (i.e. network node 11 density, standard deviation in network node density) through using neighb...

2014
Akanksha Gupta Anuj K. Gupta

Wireless Sensor Networks refers to a multi-hop packet based network that contains a set of mobile sensor nodes. Every node is free to travel separately on any route and can modify its links to other nodes. Therefore, the network is self organizing and adaptive networks which repeatedly changes its topology. The relations among nodes are restricted to their communication range, and teamwork with...

Journal: :Computer Science and Information Technologies 2021

From the last decade, a wireless sensor network (WSN) has very important role over networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are lot attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which smoothly resolved networks but tough to observe. This survey pape...

2013
Jonny Karlsson Laurence Dooley Göran Pulkkis

Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a pa...

2007
Yurong Xu Guanling Chen James Ford Fillia Makedon

Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which ...

2015
G. Keerthana

Wireless Sensor Network is one of the emerging fields in research area. It can be applied in several areas such as Area Monitoring, Health Care Monitoring, Environmental and Earth Sensing and Industrial Monitoring. WSNs are most vulnerable to various attacks like Denial of service attack, Wormhole attack, Sybil attack, Sinkhole attack, Select Forwarding attack, Blackhole attack, Malicious node ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید