Academic literature on the topic 'Malicious node'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malicious node.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malicious node"
Muruganandam, D., and J. Martin Leo Manickam. "Detection and Countermeasure of Packet Misrouting in Wireless Adhoc Networks." Sensor Letters 17, no. 9 (September 1, 2019): 696–700. http://dx.doi.org/10.1166/sl.2019.4127.
Full textBhardwaj, Indu, Sibaram Khara, and Priestly Shan. "A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 451–62. http://dx.doi.org/10.12694/scpe.v21i3.1743.
Full textZhang, Zhao Hui, Ming Ming Hu, Dong Li, and Xiao Gang Qi. "Distributed Malicious Nodes Detection in Wireless Sensor Networks." Applied Mechanics and Materials 519-520 (February 2014): 1243–46. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1243.
Full textZhang, Zhiming, Yu Yang, Wei Yang, Fuying Wu, Ping Li, and Xiaoyong Xiong. "Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks." Security and Communication Networks 2021 (September 24, 2021): 1–12. http://dx.doi.org/10.1155/2021/9082570.
Full textSubramanian, Ananda Kumar, Aritra Samanta, Sasmithaa Manickam, Abhinav Kumar, Stavros Shiaeles, and Anand Mahendran. "Linear Regression Trust Management System for IoT Systems." Cybernetics and Information Technologies 21, no. 4 (December 1, 2021): 15–27. http://dx.doi.org/10.2478/cait-2021-0040.
Full textZhang, Bo, Qianqian Song, Tao Yang, Zhonghua Zheng, and Huan Zhang. "A Fuzzy Collusive Attack Detection Mechanism for Reputation Aggregation in Mobile Social Networks: A Trust Relationship Based Perspective." Mobile Information Systems 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/5185170.
Full textAlkhalidy, Muhsen, Atalla Fahed Al-Serhan, Ayoub Alsarhan, and Bashar Igried. "A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior." Future Internet 14, no. 8 (July 26, 2022): 223. http://dx.doi.org/10.3390/fi14080223.
Full textSivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (April 30, 2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Full textAlsarhan, Ayoub, Abdel-Rahman Al-Ghuwairi, Esra'a Alshdaifat, Hasan Idhaim, and Omar Alkhawaldeh. "A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 03 (February 10, 2022): 136–50. http://dx.doi.org/10.3991/ijim.v16i03.27933.
Full textChen, Jing, Tong Li, and Rui Zhu. "Analysis of Malicious Node Identification Algorithm of Internet of Vehicles under Blockchain Technology: A Case Study of Intelligent Technology in Automotive Engineering." Applied Sciences 12, no. 16 (August 21, 2022): 8362. http://dx.doi.org/10.3390/app12168362.
Full textDissertations / Theses on the topic "Malicious node"
Zia, Tanveer. "A Security Framework for Wireless Sensor Networks." University of Sydney, 2008. http://hdl.handle.net/2123/2258.
Full textSensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes etc. However, wireless sensor networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. Though there has been some development in the field of sensor network security, the solutions presented thus far address only some of security problems faced. This research presents a security framework WSNSF (Wireless Sensor Networks Security Framework) to provide a comprehensive security solution against the known attacks in sensor networks. The proposed framework consists of four interacting components: a secure triple-key (STKS) scheme, secure routing algorithms (SRAs), a secure localization technique (SLT) and a malicious node detection mechanism. Singly, each of these components can achieve certain level of security. However, when deployed as a framework, a high degree of security is achievable. WSNSF takes into consideration the communication and computation limitations of sensor networks. While there is always a trade off between security and performance, experimental results prove that the proposed framework can achieve high degree of security with negligible overheads.
Singamsetty, Ratna Sireesha. "Detection of Malicious Nodes in Mobile Ad hoc Networks." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1321043030.
Full textKALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Full textHaddadou, Nadia. "Réseaux ad hoc véhiculaires : vers une dissémination de données efficace, coopérative et fiable." Thesis, Paris Est, 2014. http://www.theses.fr/2014PEST1023/document.
Full textVehicular Ad Hoc Networks (VANETs) allow sharing different kinds of data between vehicles in a collaborative way. In this thesis, we are particularly interested in road safety applications, designed for the exchange of information on road traffic and conditions. This kind of applications have strict Quality of Service (QoS) requirements, as data must be routed thoroughly and without any delays so for assuring the timely delivery of useful information to the drivers. In this context, data routing must face several issues raised by the high mobility and dispersion of vehicles, inadequate or completely lacking infrastructure, a variable network density, network saturation due to the large of information to deliver, and the size of the geographical areas to cover. Indeed, the problem of data dissemination in VANETs is non-trivial, and several research challenges must be solved in order to provide an efficient, collaborative, and reliable support for road safety applications. Specifically, we will address the problem of collaborative data dissemination through the following three questions: “How to perform data dissemination?”, “When should we do it?”, and “What must be disseminated?” We have provided answers to these questions through the three contributions of this thesis. Our first contribution is an efficient dissemination strategy, specifically tailored to the importance of the exchanged information as well as its lifespan, which is able to avoid the intensive dissemination process that generates network congestion and data redundancy. We confirm our statements and validate the performance of our solution by modeling it using a discrete-time Markov chain, which demonstrates the number of necessary retransmissions for all concerned vehicles to receive information. Moreover, we performed extensive simulations that show a reduction of up to 90% of redundant messages with respect to message flooding dissemination strategies. Next, in order to further improve the road safety message dissemination process, we propose a communications channel access scheduler, which aims at reducing the number of collisions caused by IEEE 802.11p/1609.4 multi-channel synchronizations, and thus improving the data reception rate. We base our solution on the optimal stopping theory, which chooses the right moment to send information by balancing the channel occupancy rate, the data delivery efficiency, and the maximum deferment delay tolerated by the information. To this end, we formulate the optimal stopping theory through a Markov decision process (MDP). We show through simulation-based evaluations an improvement of the reception rate of up to 25% and a reduction of up to 47% of message losses. Finally, after being interested in the quantitative aspect of network performance, we centered our efforts on improving the reliability of the dissemination process, which is obtained by motivating vehicles to cooperate and evicting malicious vehicles from the process. To this end, we propose a trust model inspired on signaling games, which are a type of dynamic Bayesian games. Through the use of our model, equilibrium is achieved, thus resulting in a fast and low-cost vehicle self-selection process. We define the parameters of our trust model through a discrete-time Markov chain model. To the best of our knowledge, our solution is the only existing solution that tackles the negative effects introduced by the presence of both malicious and selfish vehicles in a VANET. We evaluated the performance of our solution by modeling it using a Markov chain, and a set of simulations. Our results show that up to 100% of malicious vehicles are evicted while keeping a high cooperation rate, thus achieving an improvement of 42% when compared to other similar solutions
Langer, André, and Tom Kühnert. "Security issues in Address Autoconfiguration Protocols." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700491.
Full textchen, stanley, and 陳嘉融. "The Malicious Node Detection and Identification Mechanisms for Wireless Sensor Networks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/63265720978978639169.
Full text長庚大學
資訊管理研究所
94
Wireless Sensor Network (WSN) is a new developing type of wireless networks. Comparing with Wireless Local Area Network (WLAN), WSN has more restrictions on hardware specification of sensor node and deployment environment. The application of WSN has been growing in recent years. Many security protocols that designed for this particular network had been developed, simulated, verified and successfully implemented. However, the security challenge and difficulty that WSN has to faced will not be able to be solved completely in a few years. This study will begin with improving the whole of security of WSN to propose a suite of malicious node detection and identification mechanisms for WSN. These mechanisms include key pre-load mechanism, neighbor discovery mechanism, authentication key distribution mechanism and node authentication mechanism. The first three mechanisms may be regard as pre-processing to execute the last mechanism. After pre-processing, node in the network can easily detect whether malicious node in its communication range exists. If malicious node exists, it could be identified simultaneously.
Li, Yang-Tang, and 李泱瑭. "The Study of Active Malicious Nodes Detection in Mobile Ad Hoc Networks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/08131356805533374286.
Full text中華大學
資訊工程學系碩士班
101
In mobile ad hoc networks (MANET), network security problems emerge in an endless stream. For example, malicious nodes may become immediate nodes of routing paths first by replying spoof routing information. Then data packets might be stolen, modified, and even dropped by malicious nodes. These kinds of behavior interfere or interrupt communication between nodes, wasting unnecessary bandwidth resource. In the literature, there exists many works on solving malicious nodes problems in MANET. We can classify them into three categories. The methods of the first class are to find more safety routing paths by modifying original routing protocols. In the second class, the proposed solutions are trying to identify spoof routing information by adding new detecting protocols. In the third class, neighboring nodes help to identify malicious nodes by eavesdropping whether packets are transmitted or not. But these solutions proposed in the literature can not avoid extra overhead in each node. In addition, it's hard to be practicable by modifying or adding protocols to solve malicious nodes problems. In this paper, we proposed a new method to detect malicious nodes actively. Without modification and addition of original routing protocols, only few pairs of detection nodes are needed to identify and isolate malicious nodes. In our simulation, the results show that packets delivery rate can be improved to 23% by one pair of detection nodes and the average overhead of each node is only increased by 0.1 KB/s.
FanChiang, Chun-Chih, and 范姜群志. "Robust transmission algorithm in network coding domain with the presence of malicious nodes." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/00663336860989909666.
Full text國立交通大學
網路工程研究所
99
Network coding has become an important file transfer method in P2P networks. But it suffers from the jamming attack when compared with store and forward method. In this thesis, we propose a system that reduces the drawbacks of malicious attacks. In our system, we use the reputation system to separate good users from bad ones and take homomorphic hash function to verify the received content and find a proper check rate for received blocks so that the transmitted data from a peer can reach a predefined correct rate.
Tsai, Hsiao-Chien, and 蔡効謙. "On Design of Reputation Mechanisms to Detect Malicious Nodes in Mobile Ad Hoc Networks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/445m4d.
Full text國立臺灣科技大學
資訊管理系
99
A mobile ad hoc network (MANET) is a wireless communication network formed by a group of mobile devices. In a MANET environment, fixed infrastructure is not supported. When two nodes want to establish communication channel between each other, they require other intermediate nodes, which may move themselves during the communication session, to cooperatively help them to dynamically construct a route. There is no central authority in a MANET, therefore, a node cannot monitor and enforce other nodes to cooperatively provide reliable communication services. Any intermediate node in a data routing path may arbitrarily decide what action it will perform when receiving a route request or a forwarding data packet. Hence, for selfish or malicious reasons, malicious actions such as packet dropping and false information dissemination may be performed by a mobile node easily. Therefore, how to dynamically detect malicious nodes such that normal communications will not be disrupted or delayed and false information will not be spread, has become a critical issue and a challenging research topic in MANETs. This dissertation proposed several mechanisms based on different concepts to detect malicious nodes in MANETs. First of all, a fuzzy inference engine for nodes in a MANET is proposed. The engine installed inside a node can infer the trust level of a target node based on observing reports from its neighboring nodes. Secondly, a node reputation system, which dynamically changes its trust evaluation models based on the current status of MANET environment, is introduced. Finally, a reputation calibration mechanism for general reputation systems is derived. The most challenge issue of malicious node detection in MANETs is that the dynamics of node mobility and everlastingly changed network status make trust evaluation of a target node inaccurate. The proposed reputation calibration mechanism can correct inaccurate trust value and let reputation system effectively detect malicious nodes in error-prone networks. The proposed mechanisms are all extensively evaluated by network simulations. The simulation results show that the reputation calibration mechanism is a promising way to detect malicious nodes in highly mobile and unstable networks. The lesson we learned is that there is no clear rule to define whether a detected node behavior is based on malicious motivation in MANETs. Using fixed rules to detect malicious node behaviors is not always suitable. Instead, by adopting calibration mechanism, we can easily detect whether a node behavior is more toward to misbehaved direction or not. Dynamically constructing detection rules based on the behaviors of neighboring nodes is a promising way to effectively detect malicious nodes.
Tsou, Po-Chun, and 鄒博鈞. "An Efficient Hybrid Defense Architecture to Prevent Malicious Nodes in Mobile Ad hoc Networks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/38033338680083169390.
Full text國立宜蘭大學
資訊工程研究所碩士班
99
With the widespread availability of mobile devices, and rapid development of wireless technologies, the number of users of Mobile Ad hoc Networks (MANETs) is increasing at a quick rate. Due to the fact that infrastructure is not needed for MANETs, it can be deployed fast and conveniently in any environment, which makes it suitable for military operations, emergent preparedness and response operations. However, due to the dynamic nature of its network topology, its infrastructure-less property and the lack of certificate authority, achieving security of data and routing in MANETs is an ongoing challenge. Common routing protocols in MANETs such as DSR, AODV, to name a few, do not implement mechanisms for detection and responses to attacks. Focusing on possible attacks by malicious nodes based on the DSR protocol, this thesis presents a mechanism (referred to as Cooperative Bait Detection Scheme (CBDS)) that can be used to effectively detect malicious nodes launching black-hole/gray-hole attacks as well as cooperative black-hole attacks. CBDS integrates the advantages of both proactive and reactive defense architectures, and implements a reverse tracing technique to help achieving the stated goal. Simulation results are given to validate the stated goal, showing that under malicious nodes attacks, CBDS outperforms the DSR, 2ACK, and BFTR protocols in terms of packet delivery ratio and routing overhead, chosen as performance metrics.
Books on the topic "Malicious node"
Jaiswal, Anurag Kumar. Malicious Behavior in Mobile Adhoc Networks: An Scheme to detect Misbehaving Nodes in Mobile Ad-Hoc Network MANET. LAP Lambert Academic Publishing, 2012.
Find full textBook chapters on the topic "Malicious node"
Dumka, Ankur, Alaknanda Ashok, Parag Verma, Anuj Bhardwaj, and Navneet Kaur. "Malicious Node Detection Mechanisms." In Security Issues for Wireless Sensor Networks, 213–40. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003257608-8.
Full textRahim, Aneel, and Fahad bin Muyaha. "Impact of Malicious Node on Broadcast Schemes." In Security Technology, 86–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10847-1_11.
Full textMondal, Subhash, Subinoy Mukherjee, and Suharta Banerjee. "Machine Learning Based Malicious Node Detection in IoT Environment." In Advanced Techniques for IoT Applications, 316–26. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_30.
Full textYang, Hongyu, Xugao Zhang, and Fang Cheng. "A Novel Wireless Sensor Networks Malicious Node Detection Method." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 697–706. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21373-2_59.
Full textAnjana, K. P., and K. G. Preetha. "A Novel Approach for Malicious Node Detection in MANET." In Advances in Intelligent Systems and Computing, 163–73. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-28031-8_14.
Full textGanesan, A., and A. Kumar Kompaiya. "Discovering the Performance of MANET with Malicious and Non-malicious Node Using Newton–Raphson Method." In Smart Innovation, Systems and Technologies, 423–39. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-7447-2_38.
Full textZheng, Minzhen, Shudong Li, Danna Lu, Wei Wang, Xiaobo Wu, and Dawei Zhao. "Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks." In Communications in Computer and Information Science, 446–53. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-1304-6_36.
Full textDabhade, Vaibhav, and A. S. Alvi. "Malicious Node Detection and Prevention for Secured Communication in WSN." In Computer Networks, Big Data and IoT, 121–36. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0898-9_10.
Full textRathod, Punit, Nirali Mody, Dhaval Gada, Rajat Gogri, Zalak Dedhia, Sugata Sanyal, and Ajith Abraham. "Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks." In Distributed Computing - IWDC 2004, 541–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30536-1_68.
Full textLiu, Yuanzhen, Yanbo Yang, Jiawei Zhang, and Baoshan Li. "Design of Anti Machine Learning Malicious Node System Based on Blockchain." In Cyberspace Safety and Security, 358–73. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18067-5_26.
Full textConference papers on the topic "Malicious node"
Y Al Yahmadi, Faisal, and Muhammad R Ahmed. "Malicious Node Detection in Smart Grid Networks." In 11th International Conference on Computer Science and Information Technology (CCSIT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110716.
Full textAnceaume, Emmanuelle, Yann Busnel, and Bruno Sericola. "Uniform node sampling service robust against collusions of malicious nodes." In 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2013. http://dx.doi.org/10.1109/dsn.2013.6575363.
Full textAtassi, A., N. Sayegh, I. Elhajj, A. Chehab, and A. Kayssi. "Malicious Node Detection in Wireless Sensor Networks." In 2013 Workshops of 27th International Conference on Advanced Information Networking and Applications (WAINA). IEEE, 2013. http://dx.doi.org/10.1109/waina.2013.135.
Full textAhmad, Asma'a, Majeed Alajeely, and Robin Doss. "Reputation based malicious node detection in OppNets." In 2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 2016. http://dx.doi.org/10.1109/jcsse.2016.7748925.
Full textHardy, Tyler J., Richard K. Martin, and Ryan W. Thomas. "Malicious node detection via physical layer data." In 2010 44th Asilomar Conference on Signals, Systems and Computers. IEEE, 2010. http://dx.doi.org/10.1109/acssc.2010.5757772.
Full textLi, Na, and David Lee. "Network Court Protocol and Malicious Node Conviction." In 2007 IEEE International Conference on Network Protocols. IEEE, 2007. http://dx.doi.org/10.1109/icnp.2007.4375869.
Full textMahbooba, Basim, Mohan Timilsina, and Martin Serrano. "Trusting Machine Learning Algorithms in Predicting Malicious Nodes Attacks." In 9th International Conference on Artificial Intelligence and Applications (AIAP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120408.
Full textPongaliur, Kanthakumar, Li Xiao, and Alex X. Liu. "CENDA: Camouflage Event Based Malicious Node Detection Architecture." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5337045.
Full textPadmaja, P., and G. V. Marutheswar. "Detection of Malicious Node in Wireless Sensor Network." In 2017 IEEE 7th International Advance Computing Conference (IACC). IEEE, 2017. http://dx.doi.org/10.1109/iacc.2017.0052.
Full textGriswold, Richard L., and Sirisha R. Medidi. "Malicious node detection in ad-hoc wireless networks." In AeroSense 2003, edited by Raghuveer M. Rao, Soheil A. Dianat, and Michael D. Zoltowski. SPIE, 2003. http://dx.doi.org/10.1117/12.485911.
Full text