نتایج جستجو برای: wormhole attack

تعداد نتایج: 82627  

Journal: :CoRR 2011
Dhadesugoor R. Vaman Niraj Shakhakarmi

A novel Strict Friendliness Verification (SFV) scheme based on the integrated key consisting of symmetric node identity, geographic location and round trip response time between the sender and the receiver radio in MANET is proposed. This key is dynamically updated for encryption and decryption of each packet to resolve Wormhole attack and Sybil attack. Additionally, it meets the minimal key le...

2015
Mohammad Nurul Afsar Shaon

This paper presents an innovative wormhole detection scheme an using artificial neural network for wireless sensor networks (WSNs). Most detection schemes described in the literature are designed for uniformly distributed sensors in a network, using statistical and topological information and special hardware. However, these schemes may perform poorly in non-uniformly distributed networks. Acco...

Journal: :IEEE Wireless Commun. 2010
Yanzhi Ren Mooi Choo Chuah Jie Yang Yingying Chen

The Delay Tolerant Networks (DTNs) are especially useful in providing mission critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which replays them locally into the network. Wormhole attacks are a severe threat to ...

2013
Poonam Dabas Prateek Thakral

A Mobile Ad-Hoc Network (MANET) is an infrastructure less self-configured collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. Security has become a primary concern in order to provide protected communication between mobile nodes in an aggressive environment. The absence...

2014
Damandeep Kaur Parminder Singh

Wireless sensor networks are networks having non wired infrastructure and dynamic topology. In OSI model each layer is prone to various attacks, which halts the performance of a network .In this paper several attacks on four layers of OSI model are discussed and security mechanism is described to prevent attack in network layer i.e wormhole attack. In Wormhole attack two or more malicious nodes...

2014
Hosny M. Ibrahim Nagwa M. Omar Ebram K. William W. K. Seah J. Eriksson S. V. Krishnamurthy

Mobile ad hoc network (MANET) is vulnerable to many types of routing attacks due to its dynamic topology and the collaboration of MANET nodes in finding routing paths. The wormhole attack is considered one of the most threatening attacks. The most popular MANET routing protocols such as ad hoc on demand distance victor (AODV) are vulnerable to this security threat. In this paper, a lightweight ...

Journal: :International Journal of Computer Science & Engineering Survey 2011

2013
Miss Neha Jain Ashish Kr. Shrivastava

Mobile Ad-hoc network is additionally a network that is self-organized and adaptive in nature. As a results of lack of centralized infrastructure several security problems are arises and malicious activity performed by offender. Here we've got an inclination to tend to denote specific attack referred to as wormhole attack , throughout that the degree offender with the help of malicious node to ...

Journal: :International Journal of Information and Electronics Engineering 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید