Malicious Node Identification Strategy With Environmental Parameters
نویسندگان
چکیده
منابع مشابه
Decentralised malicious node detection in WSN
The sensitive role that wireless sensor networks (WSNs) play in interpreting the environment characteristics and the need for ensuring the integrity of the sensor readings, necessitate the use of security mechanisms. One of the main security issues in WSNs is manifested when malicious nodes spoof their identities and locations. In this paper, we propose a decentralised malicious node detection ...
متن کاملMalicious Node Detection and Path Optimization: A Review
Detection of a malicious node in neighbourhood is a requirement because otherwise that node may cause incorrect decisions or energy depletion. The methods to detect malicious node include the role-based trust approach, event-based trust approach, collaborative trust approach, and agent-based trust approach, neural-based approach. After malicious node detection we need to either correct it or ch...
متن کاملIdentification of Potential Malicious Web Pages
Malicious web pages are an emerging security concern on the Internet due to their popularity and their potential serious impact. Detecting and analysing them are very costly because of their qualities and complexities. In this paper, we present a lightweight scoring mechanism that uses static features to identify potential malicious pages. This mechanism is intended as a filter that allows us t...
متن کاملMalicious Node Position Bounding in Mobile WiFi/802.11 Networks
Hyperbolic position bounding (HPB) provides a mechanism to probabilistically delimit the location of a wireless network malicious insider to a candidate area. A large scale path loss model is used to construct a probable distance difference range between a rogue transmitter and a pair of trusted receivers. Hyperbolas are constructed at the minimum and maximum bounds of this range to delineate t...
متن کاملA Game Theory Approach for Malicious Node Detection in MANETs
One of the main features of nodes in mobile ad hoc networks (MANETs) is their cooperation with neighbors to propagate data. Misusing this feature, malicious nodes cooperate with normal nodes to disrupt network operation and reduce its efficiency. These nodes attack other network nodes and prevent being detected by other nodes through using the mobility characteristic of nodes in MANETs. One of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.3013840