نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

2014
A. Babu Karuppiah A. Raja Prakash

A wireless sensor network consists of many sensor nodes which are deployed to monitor physical or environmental conditions and to pass the collected data to a base station. Though wireless sensor network is subjected to have major applications in all the areas, it also has many security threats and attacks. Among all threats such as sinkhole, wormhole, selective forwarding, denial of service an...

2013
Karine Altisen Stéphane Devismes Raphaël Jamet Pascal Lafourcade

We propose SR3, a secure and resilient algorithm for convergecast routing in WSNs. SR3 uses lightweight cryptographic primitives to achieve data confidentiality and data packet unforgeability. SR3 has a security proven by formal tool. We made simulations to show the resiliency of SR3 against various scenarios, where we mixed selective forwarding, blackhole, wormhole, and Sybil attacks. We compa...

2016
P. Ganesh M. Praba

Due to the broadcast nature of the wireless medium, wireless networks are especially vulnerable to Sybil attacks, where a malicious node illegitimately claims a large number of identities and thus depletes system resources. A wireless sensor network consists of many sensor nodes which are deployed to monitor physical or environmental conditions and to pass the collected data to a base station. ...

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

2016
Anil Saini

MANETs are fast emerging as alternate network architecture to infrastructure networks. It is finding many applications and the constraints of processing power, memory, and bandwidth will be soon being overcome with the rapid improvement in the technologies. However the major concern which will remain is the security of the network. MANETs differ largely in the routing mechanism in the network l...

Journal: :EURASIP Journal on Advances in Signal Processing 2021

Abstract The Internet of Things (IoT) is an emerging concept in the field information technology. IoT can integrate any real-time entity with another, using sensing, computing and communication capabilities to offer enhanced services everyday life. In this article, IoT-based patient health monitoring considered for use sensors deployed devices. These devices are attached body timely tracking hi...

Journal: :International journal of innovative technology and exploring engineering 2021

Wireless sensor networks (WSN) are highly vulnerable to attacks and constraints on resources like power, processing, radio signal. In high constraint environments adapting detection defence mechanisms is a challenge. this paper analysis of Distributed Denial Service Sybil, Sinkhole, Wormhole attack for power optimization carried out based the consumption parameter. Power attributes affects effi...

Journal: :CoRR 2017
Haizhong Zheng Minhui Xue Hao Lu Shuang Hao Haojin Zhu Xiaohui Liang Keith W. Ross

Popular User-Review Social Networks (URSNs)— such as Dianping, Yelp, and Amazon—are often the targets of reputation attacks in which fake reviews are posted in order to boost or diminish the ratings of listed products and services. These attacks often emanate from a collection of accounts, called Sybils, which are collectively managed by a group of real users. A new advanced scheme, which we te...

2011
Dayananda Sagar

Wireless sensor network is an area where there has been alot of significant developments. These sensors are hugely utilized in many applications like military applications, home automation, and environment surveillance. An application where confidential data is being transmitted requires to be protected from different types of attacks. Though the nodes are authenticated, they are liable to get ...

Journal: :journal of communication engineering 0
mohammad ehdaie parsa sharif research center nikolaos alexiou kth panos papadimitratos kth

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید