نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

2012
Yu Yang Lan Yang

-Peer-to-Peer (P2P) network is a distributed network architecture that partitions tasks or workloads among peers (nodes). Similar to traditional Internet, P2P networks are open to many attacks. In this research work we survey the defensive measures against general attacks as well as P2P specific attacks. We take BitTorrent (a P2P communications protocol for file sharing) as an example to illust...

2014
Oana Goga Giridhari Venkatadri Krishna P. Gummadi

Today, users sign on to most online social networking sites like Facebook, Twitter, and Google+ via weak identities, i.e., unverified identities that do not require users to prove that their online identities match their offline (real world) personalities. Weak identities leave the sites vulnerable to a variety of fake identity or Sybil attacks. In this paper, we focus on identity impersonation...

2015
Rajalakshmi Umamaheswari

In wireless and sensor network are deployed, they will increase malicious attacks. Faking approaches are represent in the form identify compromise and can provide a variety of traffic injection approach a reducing the performance of network. To avoid faking approach to detect the presents of various type of attacks and eliminate them from the network. To handle these attack to apply cryptograph...

Journal: :Int. J. Computational Intelligence Systems 2012
Liangyu Luan Yingfang Fu Peng Xiao Lingxi Peng

Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting, watch-nodes-based detection and identity-based cryptosystem are used. The simulation results a...

Journal: :Computers, materials & continua 2022

Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over wireless sensor networks (WSNs). Wormhole are characterized as distributed passive that can destabilize or disable WSNs. The nature these makes them enormously challenging to detect. main objective find all possible ways in which how network’s broadcasting character transmission medium allows attacke...

2011
Oya Simsek Albert Levi

7 tions are proposed for wormhole attacks in sensor networks, but only a few of 8 them take mobility of sensor nodes into account. We propose a distributed 9 wormhole detection scheme for mobile wireless sensor networks in which mobility 10 of sensor nodes is utilized to estimate two network features (i.e. network node 11 density, standard deviation in network node density) through using neighb...

2011
Rayala Upendar Rao Madarapu Naresh Kumar K Palanivel

wireless sensors having limited capabilities, because of these factors sensors possess huge attacks like sinkhole, worm hole, Sybil, flooding, etc. a lot of research work already done, but no one implemented secure routing protocol to mitigate all these attacks. Some proposals came on security of wireless sensor network which controlled only one or two attacks. We proposed Secure Routing in Clu...

Journal: :IJSN 2008
Weichao Wang Jiejun Kong Bharat K. Bhargava Mario Gerla

We propose a distributed mechanism, Dis-VoW, to detect wormhole attacks in under-water sensor networks. In Dis-VoW, every sensor reconstructs local network layout using multi-dimensional scaling. It detects the wormholes by visualising the distortions in edge lengths and angles among neighbouring sensors. The contributions include: • Dis-VoW does not depend on any special hardware • it provides...

Journal: :International Journal of Engineering and Technology 2017

2016
Shalki Naresh

Wireless Mesh Networks (WMNs) have come out as an economical and extensible technology that can offer low-cost, high bandwidth, better coverage, etc to meet the needs of lot of people with different properties. But because of its open nature and wireless transmission; it is prone to many attacks of which the wormhole is the severe one. In this attack, the attackers form a tunnel between them; o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید