نتایج جستجو برای: wormhole and sybil attacks
تعداد نتایج: 16832654 فیلتر نتایج به سال:
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
The wireless sensor networks are prone to various attacks; this is primarily due to the fact that these networks once deployed are left unattended. So any attacker with the intention of stealing the information from the network can compromise any node and gain access to the data being propagated in the network. Various attacks possible are black hole attack, wormhole attack, Sybil attack, clone...
Relative location information is very useful in vehicular networks although it is vulnerable to various attacks. Many techniques have been proposed for relative positioning and location verification. Due to the high speed and the strict security requirements, the existing relative positioning and location verification techniques are not directly applicable to vehicular networks. Hence we presen...
Vehicular Ad hoc Networks (VANET) is the subclass of Mobile Ad Hoc Networks (MANETs). It is the most advanced technology that provides Intelligent Transportation System (ITS) in wireless communication among vehicles to vehicles and road side equipment (RSUs) to vehicles according to IEEE 802.11p standard. VANET provides broad range of safety and non safety applications. Safety application provi...
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must consider various attacks on vehicular networks. Also the localization system should protect the drivers’ identity and make it difficult for the adversary to track vehicles. Many techniques have been proposed for relative ...
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, prop...
Wireless Sensor Network is one of the emerging fields in research area. It can be applied in several areas such as Area Monitoring, Health Care Monitoring, Environmental and Earth Sensing and Industrial Monitoring. WSNs are most vulnerable to various attacks like Denial of service attack, Wormhole attack, Sybil attack, Sinkhole attack, Select Forwarding attack, Blackhole attack, Malicious node ...
Secure localization of unknown nodes in a Wireless Sensor Network (WSN) is an important research subject. When WSNs are deployed in hostile environments, many attacks happen, e.g., wormhole, sinkhole and sybil attacks. Two issues about unknown nodes’ secure localization need to be considered. First, the attackers may disguise as or attack the unknown and anchor nodes to interfere with localizat...
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerni...
The Wireless Sensor Network (WSN) technology is being used in a huge number of monitoring applications. It consists large sensor nodes with limited battery life. These devices are deployed randomly zone to collect the data. But these threatened and attacked by several malicious behaviors caused some nodes, which result security attacks. Several attacks occur different layers wireless network. D...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید