نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

M. Ahmadi S. M. Jameii

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

2017
Mandeep Kaur Avinash Jethi

The wireless sensor networks are prone to various attacks; this is primarily due to the fact that these networks once deployed are left unattended. So any attacker with the intention of stealing the information from the network can compromise any node and gain access to the data being propagated in the network. Various attacks possible are black hole attack, wormhole attack, Sybil attack, clone...

2006
Lei Tang Xiaoyan Hong Phillip G. Bradford

Relative location information is very useful in vehicular networks although it is vulnerable to various attacks. Many techniques have been proposed for relative positioning and location verification. Due to the high speed and the strict security requirements, the existing relative positioning and location verification techniques are not directly applicable to vehicular networks. Hence we presen...

2014
Khushboo Mittal Priyanka Garg

Vehicular Ad hoc Networks (VANET) is the subclass of Mobile Ad Hoc Networks (MANETs). It is the most advanced technology that provides Intelligent Transportation System (ITS) in wireless communication among vehicles to vehicles and road side equipment (RSUs) to vehicles according to IEEE 802.11p standard. VANET provides broad range of safety and non safety applications. Safety application provi...

Journal: :Security and Communication Networks 2008
Lei Tang Xiaoyan Hong Phillip G. Bradford

Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must consider various attacks on vehicular networks. Also the localization system should protect the drivers’ identity and make it difficult for the adversary to track vehicles. Many techniques have been proposed for relative ...

2018
Khattab M Ali Alheeti Muzhir Shaban Al-Ani Klaus McDonald-Maier

Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, prop...

2015
G. Keerthana

Wireless Sensor Network is one of the emerging fields in research area. It can be applied in several areas such as Area Monitoring, Health Care Monitoring, Environmental and Earth Sensing and Industrial Monitoring. WSNs are most vulnerable to various attacks like Denial of service attack, Wormhole attack, Sybil attack, Sinkhole attack, Select Forwarding attack, Blackhole attack, Malicious node ...

2011
Jinfang Jiang Guangjie Han Chuan Zhu Yuhui Dong Na Zhang

Secure localization of unknown nodes in a Wireless Sensor Network (WSN) is an important research subject. When WSNs are deployed in hostile environments, many attacks happen, e.g., wormhole, sinkhole and sybil attacks. Two issues about unknown nodes’ secure localization need to be considered. First, the attackers may disguise as or attack the unknown and anchor nodes to interfere with localizat...

2015
Udaya Suriya Raj Kumar Dhamodharan Rajamani Vayanaperumal

Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerni...

Journal: :Asian journal of convergence in technology 2023

The Wireless Sensor Network (WSN) technology is being used in a huge number of monitoring applications. It consists large sensor nodes with limited battery life. These devices are deployed randomly zone to collect the data. But these threatened and attacked by several malicious behaviors caused some nodes, which result security attacks. Several attacks occur different layers wireless network. D...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید