نتایج جستجو برای: sinkhole density
تعداد نتایج: 410563 فیلتر نتایج به سال:
Botnets continue to pose a significant threat to Internet security, and their detection remains a focus of academic and industry research. Some of the most successful botnet measurement and remediation efforts rely heavily on sinkholing the botnet’s command and control (C&C) domains [1]. Essentially, sinkholing consists of re-writing the DNS resource records of C&C domains to point to one or mo...
In 2008 a stream flow created a sinkhole near Park City, Utah, creating an irregular-shaped depression in the alluvium about 22 m long, 10 m wide and 6 m deep. The entire discharge of a nearby creek flowed into the sinkhole increasing the size of the sinkhole. A total of 10 GPR and 4 seismic refraction profiles were conducted to find lateral and vertical extensions of this sinkhole. Interpretat...
Wireless Sensor Network is one of the emerging fields in research area. It can be applied in several areas such as Area Monitoring, Health Care Monitoring, Environmental and Earth Sensing and Industrial Monitoring. WSNs are most vulnerable to various attacks like Denial of service attack, Wormhole attack, Sybil attack, Sinkhole attack, Select Forwarding attack, Blackhole attack, Malicious node ...
Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks. There are many possible attacks on sensor network such as selective forwarding, ja...
Wireless Sensor Networks (WSNs) are composed of many sensor nodes and a base station for collecting event information from a wide local area. However, an attacker can easily intrude into a network through external nodes by exploiting characteristics of wireless communication and the limited hardware resources of sensor nodes. Specifically, an attacker can intrude into a sensor network and launc...
Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the wireless sensor node is their characteristics which include low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Base on those characteristics makes this network vul...
MIX has recently been proposed as a new sensor scheme with better energy management for data-gathering in Wireless Sensor Networks. However, it is not known how it performs when some of the sensors carry out sinkhole attacks. In this paper, we propose a variant of MIX with adjunct computational trust management to limit the impact of such sinkhole attacks. We evaluate how MIX resists sinkhole a...
Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted traffic is used for selective forwarding, ...
Wireless sensor networks (WSNs) consist of many small wireless sensor nodes which are capable of sensing data and sending it to base stations. WSNs face resource constraints including limitations on communication, power, memory capacity and computational power. Also, since they are frequently deployed in hostile environments and left unattended, they are vulnerable to several attacks such as si...
Objective: To propose an Intrusion Detection System, called SDPRM (Sinkhole using Probe Route Mechanism), to distinguish sinkhole assaults on the steering administrations in IoT. Methods: intends moderate unfriendly impacts initiate IDS which troubled routine tasks. The proposed architecture has node ranker, notoriety and trust systems for recognition of assailants by examining way behaving gad...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید