74 Hits in 6.9 sec

Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks

Huzaifa Al Nahas, Jitender S. Deogun, Eric D. Manley
2007 Wireless networks  
"Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks," Huzaifa Al Nahas, Jitender S. Deogun, and Eric D. Manley.  ...  "Security in Wireless Sensor Networks: Issues and protocols," Huzaifa Al Nahas, Jiten- der S. Deogun, and Eric D. Manley.  ... 
doi:10.1007/s11276-007-0060-7 fatcat:tlhrsjpfpzbere5krnf3eqnl4y

Selected papers from Chinacom'06

Xuemin (Sherman) Shen, Andreas F. Molisch, Zhisheng Niu, Honggang Zhang
2007 Wireless networks  
In the paper "Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks", Huzaifa Al Nahas, et al., propose a novel routing approach, Secure-Path  ...  The first two papers propose efficient and secure routing algorithms for wireless sensor networks.  ...  In the paper ''Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks'', Huzaifa Al Nahas, et al., propose a novel routing approach,  ... 
doi:10.1007/s11276-007-0059-0 fatcat:yhjssgpqpjdhtc4npha6dsoa74

Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks - Survey

Md Abdul Azeem, Khaleel ur Rahman khan, Pramod
2011 International Journal of Computer Science & Engineering Survey  
. we survey the major topics in wireless sensor network security architecture framework includes the requirements in the sensor security, classify many of the current attacks, listing out their corresponding  ...  defensive measures that can be applied, and finally the classification of secure routing protocols, its design issues and their comparison.  ...  in terms of energy efficiency and performance.  ... 
doi:10.5121/ijcses.2011.2414 fatcat:2xjlygwegfaadjrzfuiaysyiyu

Research on Security Mechanisms for Wireless Sensor Network

Chengwei Hu
2016 International Journal of Future Generation Communication and Networking  
Wireless Sensor Networks (WSN) is one such technology that connects the virtual world and the physical world where nodes can autonomously communicate among each other and with intelligent systems.  ...  In our paper we mainly focus on the security threats in WSN. We have presented the summery of the WSNs threats affecting different layers along with their defense mechanism.  ...  Energy conservation is an overriding concern in the development of any routing algorithm for wireless sensor networks.  ... 
doi:10.14257/ijfgcn.2016.9.7.17 fatcat:nzxsr4s6kjeftbkxstusfljada

Identifying and Improving the Malicious Behavior of Rushing and Blackhole Attacks using Proposed IDSAODV Protocol

2019 International journal of recent technology and engineering  
This research work contributes towards mitigating network layer attacks on routing protocols in Wireless Ad hoc Networks.  ...  in MANET and Sensor network.  ...  [20] introduced two new cryptographic protocols of different complexity and strength in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor Networks  ... 
doi:10.35940/ijrte.c5317.098319 fatcat:pcsvihjrtrevlfvnft2afqpxze

Secure route selection in wireless mesh networks

Shafiullah Khan, Nabil Ali Alrajeh, Kok-Keong Loo
2012 Computer Networks  
In this paper, we propose a secure route selection mechanism for WMN, which is robust against a variety of multi-hop threats and performs well over a range of scenarios we tested.  ...  The large scale coverage and multi-hop architecture of wireless mesh networks (WMNs) are such characteristics which are vulnerable to network layer threats.  ...  Route discovery efficiency in the presence of sinkhole near the source. Fig. 26 . 26 Route discovery efficiency in large network (30% sinkhole nodes).  ... 
doi:10.1016/j.comnet.2011.07.005 fatcat:dh6cpkxpyjbtlj6ah7n3pijaiq

A Survey of Black Hole Detection Techniques in WSNs

Sandeep Kumar, Dr.Suman Sangwan
2015 IJARCCE  
Black hole attack is one of severe security threat that affects the network from its normal functioning by maliciously advertising itself having shortest route to the destination and then drops all receiving  ...  But wireless sensor networks are susceptible to a variety of potential attacks which obstructs the normal operation of the network.  ...  Energy holes around the base station are neglected whereas presence of energy holes in rest of the network ensures occurrence (presence/ existence) of sinkholes in network.  ... 
doi:10.17148/ijarcce.2015.45119 fatcat:rjxu4br7mrdvbkhajknkvazs4y

Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures

Ismail Butun, Patrik Osterberg, Houbing Song
2019 IEEE Communications Surveys and Tutorials  
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have a wide range of applications in our surrounding environment.  ...  Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper.  ...  An example would be the "Trust-Aware Secure Routing Framework in Wireless Sensor Networks" presented by Duan et al.  ... 
doi:10.1109/comst.2019.2953364 fatcat:wi7zt3goknciplqc2nhgqdfdei

Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

M. Rajesh Babu, S. Moses Dian, Siva Chelladurai, Mathiyalagan Palaniappan
2015 The Scientific World Journal  
In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges.  ...  For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2015/715820 pmid:26495430 pmcid:PMC4606073 fatcat:xnnh7n3ik5d4bo42qmqqb6zdhq

Countering of Black Hole Attack on Manet with AODV Protocol

Gurwinder Singh
2021 International Journal for Research in Applied Science and Engineering Technology  
Abstract: Security in mobile ad-hoc network (MANET) is the most serious issue impacting performance of network. In general, routing methods is one of the complicated and exciting analysis places.  ...  In this research, performance of one of the most efficient solutions for preventing single black hole attack in MANET using AODV routing protocol will be investigated in terms of packet delivery ratio,  ...  The wireless Adhoc sensor network and routing data in them is vulnerable to certain attacks. So, we must ensure a secure and authenticated data transmission process.  ... 
doi:10.22214/ijraset.2021.39467 fatcat:3cinwkldprdsfi4au3wvch4qyu

A Comprehensive Study on Ant Colony Optimization Technique with Special Reference to Wireless Sensor Network for Smart Home

Ruby Bhatt, Piyush Kumar Shukla
2017 International Journal of Smart Home  
ACO is a dynamic and reliable protocol. It provides energy-aware, data gathering routing structure in wireless sensor network.  ...  Wireless Sensor Networks consists of smaller nodes. These have limited power and when deployed gathers useful information. In WSNs, it is critical to collect the information in an efficient manner.  ...  Both node level and link level congestion have great impact on energy efficiency and QOS.  ... 
doi:10.14257/ijsh.2017.11.1.02 fatcat:bxvdpljqqzbjnoqx3tn2ujrtji

Secured Routing in Mobile Ad hoc Networks (MANETs)

S. Maharaja, R. Jeyalakshmi, A.V. Sabarish Kanna, M. Deva Priya
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
A node or group of nodes present in the routing path between the source and the destination may be compromised due to Byzantine attack.  ...  A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance.  ...  wireless networks for initiator and so on.  ... 
doi:10.32628/cseit195275 fatcat:24jkoix77rgdhbeckkon3x4txi

Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols

Muhammad Rizwan Ghori, Tat-Chee Wan, Gian Chand Sodhy
2020 Sensors  
Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices.  ...  Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network.  ...  Routing DT Device Tree ECDH Elliptic-curve Diffie-Hellman EE-IDSEP Energy-Efficient IDS with Energy Prediction E2SR2 Energy Efficient Secured Ring Routing EE-TS Energy Efficient Trust System  ... 
doi:10.3390/s20123590 pmid:32630381 fatcat:etgiftcnlzhvznpyrjrkpcmuze

An Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks [article]

Jaspreet Kaur
2019 arXiv   pre-print
RPL is a proactive,lightweight, Distance Vector protocol which offers security against various forms of routing attacks.  ...  The Routing Protocol for Low-Power and Lossy Networks (RPL) is the existing routing protocol for Internet of Things (IoT).  ...  In paper [8] , A hybrid routing protocol which is the combination of proactive and reactive approach is presented for wireless sensor networks with mobile sinks.  ... 
arXiv:1910.13435v2 fatcat:su5c24tc5fcbvhahtp4dmtod5i

Enhancing RPL Resilience Against Routing Layer Insider Attacks

Karel Heurtefeux, Ochirkhand Erdene-Ochir, Nasreen Mohsin, Hamid Menouar
2015 2015 IEEE 29th International Conference on Advanced Information Networking and Applications  
In this paper, Routing Protocol for Low-Power and Lossy Networks (RPL) is studied in presence of packet dropping malicious compromised nodes.  ...  In particular, the proposed resilient RPL exhibits better performance in terms of delivery ratio (up to 40%), fairness and connectivity while staying energy efficient.  ...  RPL is one of the first routing standards available for wireless sensor and constraints networks.  ... 
doi:10.1109/aina.2015.271 dblp:conf/aina/HeurtefeuxEMM15 fatcat:a5u3xbbdyvdvjbk57js3ndhdnm
« Previous Showing results 1 — 15 out of 74 results