A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNs
                    
                        
                            نویسندگان
                            
                            
                        
                        
                    
                    
                    چکیده
منابع مشابه
Secure IDS against Sybil Attacker Routing Misbehavior in MANET
Sybil attacker is the routing layer active attacker that replies with multiple identification number (ID's) to nodes that forward request to attacker in a different time instant and drop the data forwarded to attacker after link establishment. The proposed research work is provides the novel secure Intrusion Detection System (IDS) against routing misbehavior of Sybil attack in MANET. The IDS ar...
متن کاملEnabling Authentic Transmissions in WSNs – Turning Jamming against the Attacker
Traditional methods for message authentication are based on the cryptographic verification of received data using some sort of a shared secret. While this task is not critical for traditional networks, Wireless Sensor Networks (WSNs) may pay a high price for the gained protection – sensor nodes are forced to invest their already scarce resources in receiving a message and executing cryptographi...
متن کاملCountering Node Misbehavior Attacks Using Trust Based Secure Routing Protocol
Wireless sensor networks have gained remarkable appreciation over the last few years. Despite significant advantages and tremendous applications, WSN is vulnerable to variety of attacks. Due to resource constraint nature of WSN, applicability of traditional security solutions is debatable. Although cryptography, authentication and confidentiality measures help in preventing specific types of at...
متن کاملTBSRP: Trust Based Secure Routing Protocol for WSNs
A wireless sensor network is generally a vast network with large number of sensors nodes. It suffer from several constraints, like low computation capability, less storage capability, restricted energy resources, liability to physical capture, and therefore the use of insecure wireless communication channels. As the size and the density increases over the network, there are more chances of pene...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: 2079-9292
DOI: 10.3390/electronics10111244