نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

Journal: :Wireless Communications and Mobile Computing 2021

Wireless sensor network is a key technology in Internet of Things. However, due to the large number nodes and limited security capability, aging malicious increase. In order detect untrusted quickly effectively ensure reliable operation network, this paper proposes dynamic mechanism. Firstly, direct trust value node established based on its behavior regional information interaction. Then, compr...

2003
Sonja Buchegger Jean-Yves Le Boudec

Some misbehavior detection and reputation systems in mobile ad-hoc networks rely on the dissemination of information of observed behavior, which makes them vulnerable to false accusations. This vulnerability could be removed by forbidding the dissemination of information on observed behavior in the first place, but, as we show here, this has more drawbacks than a solution that allows disseminat...

2005
Asad Amir Pirzada Chris McDonald

Sensor networks are formed with the help of a large number of wireless nodes, generally with limited energy, computation and transmission powers. Each node helps every other node in the network by forwarding their packets. All is well if such an altruistic attitude is upheld by all participating nodes. However, as these nodes often operate in a physically insecure environment, they are vulnerab...

2014
Nirmala M. B A. S. Manjunath

Submitted in May 2014; Accepted in September 2014 Abstract Many sensor network applications require sensor node to obtain their locations correctly. Various techniques have been proposed to locate regular sensors based on some special nodes called anchor nodes, which are supposed to know their locations. Providing a certain degree of localization accuracy at the presence of malicious beacons be...

2009
Haiguang Chen

Cryptography and Authentication is the traditional approach to provide security in WSNs(Wireless Sensor Networks). However, that conventional approach is not sufficient for the unique characteristics and novel misbehaviors encountered in WSNs. In this paper, we use a general tool which has been used in economics, statistics and data analysis. With this approach, we propose a task-based trust ma...

Journal: :JCM 2010
Guangjie Han Lei Shu Jianhua Ma Jong Hyuk Park Jianjun Ni

Wireless Sensor Networks (WSNs) is temporarily formed, operated and managed by the nodes themselves. In a complex WSN, malicious nodes are well disguised, and they can attack the entire network on specific purpose by utilizing the natural cooperation of nodes. The error-prone characteristic of sensor nodes can also cause instability in WSN. Therefore, how to choose one or more suitable sensor n...

2016
P. Raghu

Data Aggregation (DA) is one of the most frequently used techniques in Wireless Sensor Networks (WSNs) to improve the network lifetime. It involves gathering, consolidating, and routing the sensory data collected by sensor nodes. However, research studies have demonstrated that the dependability of the DA process affects severely when malicious nodes are present in the network. Many security so...

2016
S. Gopalakrishnan P. Mohan Kumar P. M. Kumar

Mobile Ad hoc Network (MANET) is a significant concept of wireless networks which comprises of thousands of nodes that are mobile as well as autonomous and they do not requires any existing network infrastructure. The autonomous nodes can freely and randomly move within the network which can create temporary dynamic network and these networks can change their topology frequently. The security i...

2007
Tanveer Zia

Wireless sensor networks have very promising future to many applications. Ensuring that sensor nodes locations are verified and are protected from malicious attacks will enable sensor networks deployment in mission critical applications. Due to the deployment nature, sensor nodes are highly vulnerable to localization attacks where an adversary can capture the nodes, changes its location or repl...

2015
Akanksha Jain Abhishek Mathur Mohammad O. Pervaiz Mihaela Cardei Jie Wu Michael P. Howarth Elizabeth M. Royer Chai-Keong Toh Anuj K. Gupta Harsh Sadawarti Anil K. Verma

Sybil attacker is the routing layer active attacker that replies with multiple identification number (ID's) to nodes that forward request to attacker in a different time instant and drop the data forwarded to attacker after link establishment. The proposed research work is provides the novel secure Intrusion Detection System (IDS) against routing misbehavior of Sybil attack in MANET. The IDS ar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید