نتایج جستجو برای: wormhole attack

تعداد نتایج: 82627  

2015
Mihir Bellare Ran Canetti Hugo Krawczyk Yih-Chun Hu Adrian Perrig David B. Johnson Hao Yang Haiyun Luo Fan Ye Songwu Lu Rashid Hafeez Khokhar Md Asri Ngadi

A number of attacks exist at the network layer, i.e. against routing protocols. One of the most severe attacks is the wormhole attack, which consists of at least two colluding attackers, located

Journal: :International Journal of Computer Applications 2012

Journal: :International Journal of Computer Applications 2013

Journal: :The Open Cybernetics & Systemics Journal 2015

Journal: :JIPS 2010
Lukman Sharif Munir Ahmed

Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastat...

2011
RUI JIANG MEHDI AZARMI TAO GONG

Secure and dynamic clustering protocols, which are essential in wireless sensor network, are becoming a heated research area. However, the proposed protocols are vulnerable to wormhole attack. Most recently, SecDEACH protocol is proposed and claimed to provide both the resilient cluster head election, preserving a dynamic clustering, and the secure cluster formation. In this paper, we demonstra...

Journal: :International Journal of Applied Information Systems 2012

Journal: :International Journal of Engineering & Technology 2018

Journal: :Journal of Information Processing Systems 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید