نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

Journal: :Electronics 2023

Location information of sensor nodes in a wireless network is important. The are usually required to ascertain their positions so that the data collected by these can be labeled with this information. On other hand, certain attacks on networks lead incorrect estimation node positions. In such situations, when location not correct, may wrong subvert desired operation network. work, we formulate ...

2012
T. Krishna Rao Mayank Sharma M. V. Vijaya Saradhi

In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbour relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits th...

Journal: :EURASIP J. Wireless Comm. and Networking 2013
Rakesh Matam Somanath Tripathy

Wormhole attack is one of the most severe security threats in wireless mesh network that can disrupt majority of routing communications, when strategically placed. At the same time, most of the existing wormhole defence mechanisms are not secure against wormhole attacks that are launched in participation mode. In this paper, we propose WRSR, a wormhole-resistant secure routing algorithm that de...

2014
Sagar Narang Kundan Munjal Joseph P. Macker M. Scott Corson Jun-Zhao Sun J. Newsome E. Shi D. Song Murat Demirbas Youngwhan Song S. Park B. Aslam D. Turgut Cliff C. Zou

Vehicular Ad-Hoc Networks (VANET) generalization of Mobile Ad Hoc Networks (MANET) are proclaimed for extreme mobility as compared to MANET. Motivation of VANET is Traffic Administration and Human Protection. Misuse of utilities provided by VANET is more prone to attacks like Black Hole Attack and Sybil Attack. This paper is fascinated towards recognition and eviction of Sybil Attack in VANET. ...

2014
Sven Seuken David C. Parkes

For the design of distributed work systems like P2P filesharing networks it is essential to provide incentives for agents to work for each other rather than free ride. Several mechanisms have been proposed to achieve this goal, including currency systems, credit networks, and accounting mechanisms. It has proven particularly challenging to provide robustness to sybil attacks, i.e., attacks wher...

2013
Yudhvir Singh

Due to broadcast nature of Wireless Sensor Networks and lack of tamper-resistant hardware, security in sensor networks is one of the major issues. Hence research is being done on many security attacks on wireless sensor networks. Sybil attack is a particular harmful attack. When a node illegitimately claims multiple identities or claims fake id, is called Sybil attack. This paper focuses on var...

Journal: :Expert Syst. Appl. 2015
Panagiotis G. Sarigiannidis Eirini D. Karapistoli Anastasios A. Economides

Security is becoming a major concern for many mission-critical applications wireless sensor networks (WSNs) are envisaged to support. The inherently vulnerable characteristics of WSNs appoint them susceptible to various types of attacks. This work restrains its focus on how to defend against a particularly harmful form of attack, the Sybil attack. Sybil attacks can severely deteriorate the netw...

Journal: :Information Visualization 2011
Aidong Lu Weichao Wang Abhishek Dnyate Xianlin Hu

We present a robust intrusion detection approach for wireless networks based on a new multi-matrix visualization method with a set of pattern generation, evaluation, organization, and interaction functions. Our approach concentrates on assisting users to analyze statistical network topology patterns that could expose significant attack features. Specifically, we investigate Sybil attacks that h...

2014
Hosny M. Ibrahim Nagwa M. Omar Ebram K. William W. K. Seah J. Eriksson S. V. Krishnamurthy

Mobile ad hoc network (MANET) is vulnerable to many types of routing attacks due to its dynamic topology and the collaboration of MANET nodes in finding routing paths. The wormhole attack is considered one of the most threatening attacks. The most popular MANET routing protocols such as ad hoc on demand distance victor (AODV) are vulnerable to this security threat. In this paper, a lightweight ...

2013
Siwei Jiang

Our research is within the area of artificial intelligence and multiagent system. More specifically, we are interested in addressing robustness problems in trust and reputation systems so that buying agents are able to accurately model the reputation of selling agents even with the existence of various unfair rating attacks from other dishonest buyers (called advisors) [Zhang and Cohen, 2008]. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید