نتایج جستجو برای: wormhole attack
تعداد نتایج: 82627 فیلتر نتایج به سال:
As sensor-driven applications become progressively more integrated into our lives; issues linked to sensor privacy will become increasingly important. In wireless sensor networks, adversaries can make use of the traffic information for locating the monitored objects. Network coding has been shown to be an efficient approach to improve the wireless system performance. In a wormhole attack, the a...
Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially des...
In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole attack using a combination of active probing and passive monitoring tools. We exploit anomaly in the end-to-end delay and per-hop delay patterns to identify the nodes involved in a wormhole attack. We present an architec...
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc networks is wormhole attacks and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas This paper analyzes the nature of wormhole attack and existing methods of defending mec...
A temporary collection of wireless mobile nodes in decentralized manner is known as Mobile Ad hoc Network (MANET). In a hostile environment of MANET, security is the primary concern to achieve protected communication between mobile nodes. A number of nontrivial challenges to security designs mandate the demand of building multi-fence security solutions that achieve both extended protection and ...
Wireless Mesh Networks (WMNs) have come out as an economical and extensible technology that can offer low-cost, high bandwidth, better coverage, etc to meet the needs of lot of people with different properties. But because of its open nature and wireless transmission; it is prone to many attacks of which the wormhole is the severe one. In this attack, the attackers form a tunnel between them; o...
As Mobile Ad-hoc network is infrastructure less network in which every node can take part in data transmission and reception process. Various kinds of attacks have been arises in the network during transmission, which affects on the performance of the network. Wormhole attack is one attack from them which is created by collaborative attackers. Different techniques have developed to detect & pre...
Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The Wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility of wormhole attacks and recognizing techniq...
Wireless sensors networks (WSNs) consist of a large number of tiny, spatially distributed, and autonomous devices, called sensor nodes. The latter are equipped with sensing, computation, and wireless communications capabilities, and have very limited resources. Wireless sensor networks have been widely used in remote areas, military scenarios, sensing motion applications, agriculture solutions ...
The wireless sensor network is an emerging technology in the field of communication. This technology has many advantages but the security issues have been not given much consideration till now. Due to this neglecting, few loopholes in the security have started to occur such as wormhole attack, blackhole attack, etc. In this paper the various aspects have been covered regarding security provisio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید