A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks
2007
Wireless networks
"Proactive mitigation of impact of wormholes and sinkholes on routing security in
energy-efficient wireless sensor networks," Huzaifa Al Nahas, Jitender S. Deogun, and
Eric D. Manley. ...
"Security in Wireless Sensor Networks: Issues and protocols," Huzaifa Al Nahas, Jiten-
der S. Deogun, and Eric D. Manley. ...
doi:10.1007/s11276-007-0060-7
fatcat:tlhrsjpfpzbere5krnf3eqnl4y
Selected papers from Chinacom'06
2007
Wireless networks
In the paper "Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks", Huzaifa Al Nahas, et al., propose a novel routing approach, Secure-Path ...
The first two papers propose efficient and secure routing algorithms for wireless sensor networks. ...
In the paper ''Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks'', Huzaifa Al Nahas, et al., propose a novel routing approach, ...
doi:10.1007/s11276-007-0059-0
fatcat:yhjssgpqpjdhtc4npha6dsoa74
Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks - Survey
2011
International Journal of Computer Science & Engineering Survey
. we survey the major topics in wireless sensor network security architecture framework includes the requirements in the sensor security, classify many of the current attacks, listing out their corresponding ...
defensive measures that can be applied, and finally the classification of secure routing protocols, its design issues and their comparison. ...
in terms of energy efficiency and performance. ...
doi:10.5121/ijcses.2011.2414
fatcat:2xjlygwegfaadjrzfuiaysyiyu
Research on Security Mechanisms for Wireless Sensor Network
2016
International Journal of Future Generation Communication and Networking
Wireless Sensor Networks (WSN) is one such technology that connects the virtual world and the physical world where nodes can autonomously communicate among each other and with intelligent systems. ...
In our paper we mainly focus on the security threats in WSN. We have presented the summery of the WSNs threats affecting different layers along with their defense mechanism. ...
Energy conservation is an overriding concern in the development of any routing algorithm for wireless sensor networks. ...
doi:10.14257/ijfgcn.2016.9.7.17
fatcat:nzxsr4s6kjeftbkxstusfljada
Identifying and Improving the Malicious Behavior of Rushing and Blackhole Attacks using Proposed IDSAODV Protocol
2019
International journal of recent technology and engineering
This research work contributes towards mitigating network layer attacks on routing protocols in Wireless Ad hoc Networks. ...
in MANET and Sensor network. ...
[20] introduced two new cryptographic protocols of different complexity and strength in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor Networks ...
doi:10.35940/ijrte.c5317.098319
fatcat:pcsvihjrtrevlfvnft2afqpxze
Secure route selection in wireless mesh networks
2012
Computer Networks
In this paper, we propose a secure route selection mechanism for WMN, which is robust against a variety of multi-hop threats and performs well over a range of scenarios we tested. ...
The large scale coverage and multi-hop architecture of wireless mesh networks (WMNs) are such characteristics which are vulnerable to network layer threats. ...
Route discovery efficiency in the presence of sinkhole near the source.
Fig. 26 . 26 Route discovery efficiency in large network (30% sinkhole nodes). ...
doi:10.1016/j.comnet.2011.07.005
fatcat:dh6cpkxpyjbtlj6ah7n3pijaiq
A Survey of Black Hole Detection Techniques in WSNs
2015
IJARCCE
Black hole attack is one of severe security threat that affects the network from its normal functioning by maliciously advertising itself having shortest route to the destination and then drops all receiving ...
But wireless sensor networks are susceptible to a variety of potential attacks which obstructs the normal operation of the network. ...
Energy holes around the base station are neglected whereas presence of energy holes in rest of the network ensures occurrence (presence/ existence) of sinkholes in network. ...
doi:10.17148/ijarcce.2015.45119
fatcat:rjxu4br7mrdvbkhajknkvazs4y
Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures
2019
IEEE Communications Surveys and Tutorials
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have a wide range of applications in our surrounding environment. ...
Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. ...
An example would be the "Trust-Aware Secure Routing Framework in Wireless Sensor Networks" presented by Duan et al. ...
doi:10.1109/comst.2019.2953364
fatcat:wi7zt3goknciplqc2nhgqdfdei
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
2015
The Scientific World Journal
In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. ...
For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. ...
Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper. ...
doi:10.1155/2015/715820
pmid:26495430
pmcid:PMC4606073
fatcat:xnnh7n3ik5d4bo42qmqqb6zdhq
Countering of Black Hole Attack on Manet with AODV Protocol
2021
International Journal for Research in Applied Science and Engineering Technology
Abstract: Security in mobile ad-hoc network (MANET) is the most serious issue impacting performance of network. In general, routing methods is one of the complicated and exciting analysis places. ...
In this research, performance of one of the most efficient solutions for preventing single black hole attack in MANET using AODV routing protocol will be investigated in terms of packet delivery ratio, ...
The wireless Adhoc sensor network and routing data in them is vulnerable to certain attacks. So, we must ensure a secure and authenticated data transmission process. ...
doi:10.22214/ijraset.2021.39467
fatcat:3cinwkldprdsfi4au3wvch4qyu
A Comprehensive Study on Ant Colony Optimization Technique with Special Reference to Wireless Sensor Network for Smart Home
2017
International Journal of Smart Home
ACO is a dynamic and reliable protocol. It provides energy-aware, data gathering routing structure in wireless sensor network. ...
Wireless Sensor Networks consists of smaller nodes. These have limited power and when deployed gathers useful information. In WSNs, it is critical to collect the information in an efficient manner. ...
Both node level and link level congestion have great impact on energy efficiency and QOS. ...
doi:10.14257/ijsh.2017.11.1.02
fatcat:bxvdpljqqzbjnoqx3tn2ujrtji
Secured Routing in Mobile Ad hoc Networks (MANETs)
2019
International Journal of Scientific Research in Computer Science Engineering and Information Technology
A node or group of nodes present in the routing path between the source and the destination may be compromised due to Byzantine attack. ...
A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance. ...
wireless networks for initiator and so on. ...
doi:10.32628/cseit195275
fatcat:24jkoix77rgdhbeckkon3x4txi
Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols
2020
Sensors
Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. ...
Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. ...
Routing
DT
Device Tree
ECDH
Elliptic-curve Diffie-Hellman
EE-IDSEP
Energy-Efficient IDS with Energy Prediction
E2SR2
Energy Efficient Secured Ring Routing
EE-TS
Energy Efficient Trust System ...
doi:10.3390/s20123590
pmid:32630381
fatcat:etgiftcnlzhvznpyrjrkpcmuze
An Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks
[article]
2019
arXiv
pre-print
RPL is a proactive,lightweight, Distance Vector protocol which offers security against various forms of routing attacks. ...
The Routing Protocol for Low-Power and Lossy Networks (RPL) is the existing routing protocol for Internet of Things (IoT). ...
In paper [8] , A hybrid routing protocol which is the combination of proactive and reactive approach is presented for wireless sensor networks with mobile sinks. ...
arXiv:1910.13435v2
fatcat:su5c24tc5fcbvhahtp4dmtod5i
Enhancing RPL Resilience Against Routing Layer Insider Attacks
2015
2015 IEEE 29th International Conference on Advanced Information Networking and Applications
In this paper, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes. ...
In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient. ...
RPL is one of the first routing standards available for wireless sensor and constraints networks. ...
doi:10.1109/aina.2015.271
dblp:conf/aina/HeurtefeuxEMM15
fatcat:a5u3xbbdyvdvjbk57js3ndhdnm
« Previous
Showing results 1 — 15 out of 74 results