نتایج جستجو برای: wormhole detection scheme
تعداد نتایج: 774238 فیلتر نتایج به سال:
This paper proposes a distributed wormhole detection algorithm for wireless sensor networks, a potential technology for infrastructures of many applications. Currently, most sensor networks assume they will be deployed in a benign environment; however, when a sensor network is deployed in some hostile environment, attacks (especially those like wormhole attacks that don’t need to capture the ke...
Copyright © 2013 Dong Seong Kim et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Wireless ad hoc and sensor networks have received considerable attention due to the potential applications in civil, military, and homeland sec...
Wang, Weichao. Ph.D., Purdue University, August, 2005. Securing Wireless Network Topology and Routing. Major Professor: Bharat Bhargava. This dissertation investigates two research problems to protect wireless network topology and routing: (1) designing protocols with configurable overhead to defend against wormhole attacks; (2) designing an intruder identification mechanism to locate and isola...
A novel Strict Friendliness Verification (SFV) scheme based on the integrated key consisting of symmetric node identity, geographic location and round trip response time between the sender and the receiver radio in MANET is proposed. This key is dynamically updated for encryption and decryption of each packet to resolve Wormhole attack and Sybil attack. Additionally, it meets the minimal key le...
Routing Attacks are a serious threat to communication in tactical MANETs. TOGBAD is a centralised approach, using topology graphs to detect such attacks. In this paper, we present TOGBAD’s newly added wormhole detection capability. It is an adaptation of a wormhole detection method developed by Hu et al. This method is based on nodes’ positions. We adapted it to the specific properties of tacti...
This paper proposes a general scheme for deadlock recovery based adaptive wormhole routing by considering a minimal set of additional buffers called recovery buffers. This scheme is then applied to deadlock recovery. When deadlock occurs in adaptive wormhole routing, the scheme routes the deadlocked message through a special recovery network, constructed from a sub set of the available network ...
Routing attacks are a major challenge in the process of designing of effective and robust security mechanisms for WSNs. This research work proposes a distributed wormhole detection algorithm called Wormhole Geographic Distributed Detection (WGDD), that is based on detecting disorder of the networks which is caused by the existence of a wormhole inside the network.
This paper proposes and evaluates a decentralized self-healing mechanism that detects and recovers from wormhole attacks in wireless multi-hop sensor networks. Upon detecting a wormhole attack, the proposed mechanism, called SWAT, identifies the locations of malicious nodes (or wormhole nodes), isolates them from the network and recovers the routing structure distorted by them. SWAT is the firs...
In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole attack using a combination of active probing and passive monitoring tools. We exploit anomaly in the end-to-end delay and per-hop delay patterns to identify the nodes involved in a wormhole attack. We present an architec...
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید