نتایج جستجو برای: Wormhole Detection Scheme

تعداد نتایج: 774238  

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

2013
Gaurav Sharma Mehajabeen Fatima

Now these day multihop wireless Ad-hoc network suffer from number of security threat namely wormhole attack. Wormhole attacks make an tunnel that attracted all the communication over the network in order either scan message over packet , drop the packet or for unwanted consumption of battery power of Adhoc network. In this paper a wormhole detection and prevention scheme has been proposed in or...

2016
Shalki Naresh

Wireless Mesh Networks (WMNs) have come out as an economical and extensible technology that can offer low-cost, high bandwidth, better coverage, etc to meet the needs of lot of people with different properties. But because of its open nature and wireless transmission; it is prone to many attacks of which the wormhole is the severe one. In this attack, the attackers form a tunnel between them; o...

Journal: :Int. J. Computational Intelligence Systems 2012
Liangyu Luan Yingfang Fu Peng Xiao Lingxi Peng

Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting, watch-nodes-based detection and identity-based cryptosystem are used. The simulation results a...

2015
Mehdi Sookhak Adnan Akhundzada Alireza Sookhak Mohammadreza Eslaminejad Abdullah Gani Muhammad Khurram Khan Xiong Li Xiaomin Wang

Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though,...

2015
Mohammad Nurul Afsar Shaon

This paper presents an innovative wormhole detection scheme an using artificial neural network for wireless sensor networks (WSNs). Most detection schemes described in the literature are designed for uniformly distributed sensors in a network, using statistical and topological information and special hardware. However, these schemes may perform poorly in non-uniformly distributed networks. Acco...

2016
Mohammad Nurul Afsar Shaon Ken Ferens

The Wormhole attack is a critical and challenging security threat for wireless sensor networks (WSNs). Although launching a wormhole attack is a relatively trivial task for the attacker, detecting it from an infected WSN is a tough job, because it can be launched from a compromised legitimate node. In recent years, signal processing methods, like the short term Fourier transform (STFT) and wave...

Journal: :EURASIP J. Wireless Comm. and Networking 2010
Honglong Chen Wei Lou Xice Sun Zhi Wang

Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the ...

2013
Huaiyu Wen Guangchun Luo

Wireless Mesh Networks (WMNs) are widely used in many areas, such as industrial, commercial and public-safety environments. However, due to the open nature of wireless communication, it is relatively easy for an adversary to launch serious wormhole attack which can’t be even prevented by cryptographic protocols. To enhance the efficiency and facility of wormhole detection, we here propose a hig...

Journal: :Int. J. Communication Systems 2014
King Sun Chan Mohammad Rafiqul Alam

Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks (MANET). In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depending on whether or not the colluders are participating in the network functions, the wormh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید