نتایج جستجو برای: sinkhole density

تعداد نتایج: 410563  

2013
Babak Rahbarinia Roberto Perdisci Manos Antonakakis David Dagon

Botnets continue to pose a significant threat to Internet security, and their detection remains a focus of academic and industry research. Some of the most successful botnet measurement and remediation efforts rely heavily on sinkholing the botnet’s command and control (C&C) domains [1]. Essentially, sinkholing consists of re-writing the DNS resource records of C&C domains to point to one or mo...

2009
Sherif M. Hanafy

In 2008 a stream flow created a sinkhole near Park City, Utah, creating an irregular-shaped depression in the alluvium about 22 m long, 10 m wide and 6 m deep. The entire discharge of a nearby creek flowed into the sinkhole increasing the size of the sinkhole. A total of 10 GPR and 4 seismic refraction profiles were conducted to find lateral and vertical extensions of this sinkhole. Interpretat...

2015
G. Keerthana

Wireless Sensor Network is one of the emerging fields in research area. It can be applied in several areas such as Area Monitoring, Health Care Monitoring, Environmental and Earth Sensing and Industrial Monitoring. WSNs are most vulnerable to various attacks like Denial of service attack, Wormhole attack, Sybil attack, Sinkhole attack, Select Forwarding attack, Blackhole attack, Malicious node ...

2015
Kesav Unnithan Lakshmi Devi

Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks. There are many possible attacks on sensor network such as selective forwarding, ja...

2016
Kyu-hyun Song Tae-ho Cho

Wireless Sensor Networks (WSNs) are composed of many sensor nodes and a base station for collecting event information from a wide local area. However, an attacker can easily intrude into a network through external nodes by exploiting characteristics of wireless communication and the limited hardware resources of sensor nodes. Specifically, an attacker can intrude into a sensor network and launc...

Journal: :CoRR 2015
George W. Kibirige Camilius Sanga

Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the wireless sensor node is their characteristics which include low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Base on those characteristics makes this network vul...

Journal: :CoRR 2007
Olivier Powell Luminita Moraru Jean-Marc Seigneur

MIX has recently been proposed as a new sensor scheme with better energy management for data-gathering in Wireless Sensor Networks. However, it is not known how it performs when some of the sensors carry out sinkhole attacks. In this paper, we propose a variant of MIX with adjunct computational trust management to limit the impact of such sinkhole attacks. We evaluate how MIX resists sinkhole a...

2009
Soo Young Moon Tae Ho Cho

Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted traffic is used for selective forwarding, ...

2013
Junaid Ahsenali Chaudhry Usman Tariq Mohammed Arif Amin Robert G. Rittenhouse

Wireless sensor networks (WSNs) consist of many small wireless sensor nodes which are capable of sensing data and sending it to base stations. WSNs face resource constraints including limitations on communication, power, memory capacity and computational power. Also, since they are frequently deployed in hostile environments and left unattended, they are vulnerable to several attacks such as si...

Journal: :Indian journal of science and technology 2022

Objective: To propose an Intrusion Detection System, called SDPRM (Sinkhole using Probe Route Mechanism), to distinguish sinkhole assaults on the steering administrations in IoT. Methods: intends moderate unfriendly impacts initiate IDS which troubled routine tasks. The proposed architecture has node ranker, notoriety and trust systems for recognition of assailants by examining way behaving gad...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید