Journal articles on the topic 'Malicious node'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malicious node.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Muruganandam, D., and J. Martin Leo Manickam. "Detection and Countermeasure of Packet Misrouting in Wireless Adhoc Networks." Sensor Letters 17, no. 9 (September 1, 2019): 696–700. http://dx.doi.org/10.1166/sl.2019.4127.
Full textBhardwaj, Indu, Sibaram Khara, and Priestly Shan. "A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 451–62. http://dx.doi.org/10.12694/scpe.v21i3.1743.
Full textZhang, Zhao Hui, Ming Ming Hu, Dong Li, and Xiao Gang Qi. "Distributed Malicious Nodes Detection in Wireless Sensor Networks." Applied Mechanics and Materials 519-520 (February 2014): 1243–46. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1243.
Full textZhang, Zhiming, Yu Yang, Wei Yang, Fuying Wu, Ping Li, and Xiaoyong Xiong. "Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks." Security and Communication Networks 2021 (September 24, 2021): 1–12. http://dx.doi.org/10.1155/2021/9082570.
Full textSubramanian, Ananda Kumar, Aritra Samanta, Sasmithaa Manickam, Abhinav Kumar, Stavros Shiaeles, and Anand Mahendran. "Linear Regression Trust Management System for IoT Systems." Cybernetics and Information Technologies 21, no. 4 (December 1, 2021): 15–27. http://dx.doi.org/10.2478/cait-2021-0040.
Full textZhang, Bo, Qianqian Song, Tao Yang, Zhonghua Zheng, and Huan Zhang. "A Fuzzy Collusive Attack Detection Mechanism for Reputation Aggregation in Mobile Social Networks: A Trust Relationship Based Perspective." Mobile Information Systems 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/5185170.
Full textAlkhalidy, Muhsen, Atalla Fahed Al-Serhan, Ayoub Alsarhan, and Bashar Igried. "A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior." Future Internet 14, no. 8 (July 26, 2022): 223. http://dx.doi.org/10.3390/fi14080223.
Full textSivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (April 30, 2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Full textAlsarhan, Ayoub, Abdel-Rahman Al-Ghuwairi, Esra'a Alshdaifat, Hasan Idhaim, and Omar Alkhawaldeh. "A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 03 (February 10, 2022): 136–50. http://dx.doi.org/10.3991/ijim.v16i03.27933.
Full textChen, Jing, Tong Li, and Rui Zhu. "Analysis of Malicious Node Identification Algorithm of Internet of Vehicles under Blockchain Technology: A Case Study of Intelligent Technology in Automotive Engineering." Applied Sciences 12, no. 16 (August 21, 2022): 8362. http://dx.doi.org/10.3390/app12168362.
Full textLi, Feng, Yali Si, Ning Lu, Zhen Chen, and Limin Shen. "A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/2761486.
Full textBhaskar .Ch, Vijaya, D. S. R. Murthy, and V. Kakulapati. "AODV (ST_AODV) on MANETs with Path Security and Trust-based Routing." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 11 (November 30, 2022): 01–06. http://dx.doi.org/10.17762/ijritcc.v10i11.5772.
Full textKumari, Shabnam, and Sumit Dalal. "Malicious Node Detection in WSN Using WTE." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 2386–90. http://dx.doi.org/10.31142/ijtsrd14611.
Full textZheng, Guiping, Bei Gong, and Yu Zhang. "Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2021 (February 27, 2021): 1–10. http://dx.doi.org/10.1155/2021/6667100.
Full textKaur, Kamaljit, and Amandeep Kaur. "Detection of Sybil Attack in VANETs." International Journal of Emerging Research in Management and Technology 6, no. 6 (June 29, 2018): 296. http://dx.doi.org/10.23956/ijermt.v6i6.285.
Full textTeng, Zhijun, Baohe Pang, Mingyang Sun, Luying Xie, and Liwen Guo. "Model for Malicious Node Recognition Based on Environmental Parameter Optimization and Time Reputation Sequence." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 38, no. 3 (June 2020): 634–42. http://dx.doi.org/10.1051/jnwpu/20203830634.
Full textA, Ganesan, and Kumar Kombaiya A. "Predicting Malicious Node Behavior in Wireless Network Using DSR Protocol and Network Metrics." International Journal of Computer Communication and Informatics 4, no. 1 (May 3, 2022): 1–10. http://dx.doi.org/10.34256/ijcci2211.
Full textYadav, G. Vidhisha, N. Ramanjaneya Reddy, and U. Sesadri. "Performance Analysis of Malicious nodes on Multi hop Cellular Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 7 (November 17, 2013): 2752–58. http://dx.doi.org/10.24297/ijct.v11i7.3473.
Full textDhingra, Madhavi, SC Jain, and Rakesh Singh Jadon. "Study on malicious node detection." Materials Today: Proceedings 29 (2020): 348–51. http://dx.doi.org/10.1016/j.matpr.2020.07.288.
Full textJamal, Tauseef, and Shariq Aziz Butt. "Malicious node analysis in MANETS." International Journal of Information Technology 11, no. 4 (April 20, 2018): 859–67. http://dx.doi.org/10.1007/s41870-018-0168-2.
Full textFarooq, Mohd Umar, Mohammad Pasha, Khaleel Ur Rahman Khan, and Mahboob Ul Haq Atif. "An Advanced Security and Data Integrity Protocol for Vehicular Ad-Hoc Networks." Advanced Materials Research 403-408 (November 2011): 994–1001. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.994.
Full textEt al., Dr S. Varalakshmi. "TRUST COMPUTATION USING BOTTOM-UP PARSER APPROACH IN MANET." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 18, 2021): 1236–41. http://dx.doi.org/10.17762/itii.v9i1.263.
Full textLakhani, Kanika. "A Simulated Novel Approach for Identifying Black Hole Attack in AODV based MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (October 30, 2005): 489–94. http://dx.doi.org/10.24297/ijct.v4i2b2.3310.
Full textVamshi krishna, H., and Gandharba Swain. "Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 152. http://dx.doi.org/10.14419/ijet.v7i4.7.20533.
Full textChen, Miao, Bao Peng, and Liang Ma. "A New Security Localization Method for Detecting Malicious Beacon Nodes in Wireless Sensor Networks." Advanced Materials Research 186 (January 2011): 428–32. http://dx.doi.org/10.4028/www.scientific.net/amr.186.428.
Full textTrivedi, Munesh C., and Sachin Malhotra. "Identification and Prevention of Joint Gray Hole and Black Hole Attacks." International Journal of Ambient Computing and Intelligence 10, no. 2 (April 2019): 80–90. http://dx.doi.org/10.4018/ijaci.2019040106.
Full textZhang, Guanqun, Mengxi Liu, and Guangjun Zai. "A Blockchain-Based IoT Terminal Trust Mechanism Management Scheme." Journal of Physics: Conference Series 2404, no. 1 (December 1, 2022): 012049. http://dx.doi.org/10.1088/1742-6596/2404/1/012049.
Full textShi, Qiong, Li Qin, Yinghua Ding, Boli Xie, Jiajie Zheng, and Lipeng Song. "Information-Aware Secure Routing in Wireless Sensor Networks." Sensors 20, no. 1 (December 26, 2019): 165. http://dx.doi.org/10.3390/s20010165.
Full textHarwahyu, Ruki, Boma A. Adhi, Harris Simaremare, Abdusy Syarif, Riri F. Sari, and Pascal Lorenz. "AODV-UI with Malicious Node Detection and Removal for Public MANET." Journal of Communications Software and Systems 8, no. 4 (December 21, 2012): 110. http://dx.doi.org/10.24138/jcomss.v8i4.165.
Full textYue-e, Yi. "Security of the Internet of Things Based on Game Algorithm." International Journal of Online Engineering (iJOE) 14, no. 08 (August 30, 2018): 80. http://dx.doi.org/10.3991/ijoe.v14i08.9178.
Full textZougagh, Hicham, Noureddine Idboufker, Rida Zoubairi, and Rachid El Ayachi. "Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems." International Journal of Business Data Communications and Networking 15, no. 2 (July 2019): 73–91. http://dx.doi.org/10.4018/ijbdcn.2019070105.
Full textHu, Xiang Dong, and Peng Qin Yu. "Detection of False Data Injection Attack in the Internet of Things." Advanced Materials Research 452-453 (January 2012): 932–36. http://dx.doi.org/10.4028/www.scientific.net/amr.452-453.932.
Full textFadli, Khafidzun, Achmad Basuki, and Eko Setiawan. "Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering." Jurnal Teknologi Informasi dan Ilmu Komputer 7, no. 3 (May 22, 2020): 591. http://dx.doi.org/10.25126/jtiik.2020733339.
Full textYu, Xiaosheng, Jie Qin, and Peng Chen. "GPBFT: A Practical Byzantine Fault-Tolerant Consensus Algorithm Based on Dual Administrator Short Group Signatures." Security and Communication Networks 2022 (August 5, 2022): 1–11. http://dx.doi.org/10.1155/2022/8311821.
Full textPalani, Saravanan, Logesh Ravi, Vijayakumar Varadarajan, Subramaniyaswamy Vairavasundaram, and Xiao-Zhi Gao. "Malicious Route Detection in Vehicular Ad-hoc Network using Geographic Routing with Masked Data." Recent Advances in Computer Science and Communications 13, no. 3 (August 12, 2020): 319–25. http://dx.doi.org/10.2174/2213275912666181205150739.
Full textAtassi, Alaa, Naoum Sayegh, Imad H. Elhajj, Ali Chehab, and Ayman Kayssi. "Decentralised malicious node detection in WSN." International Journal of Space-Based and Situated Computing 4, no. 1 (2014): 15. http://dx.doi.org/10.1504/ijssc.2014.060685.
Full textChen, Zuo, Min He, Wei Liang, and Kai Chen. "Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network." Journal of Sensors 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/716468.
Full textKong, Wenping, Xiaoyong Li, Liyang Hou, and Yanrong Li. "An Efficient and Credible Multi-Source Trust Fusion Mechanism Based on Time Decay for Edge Computing." Electronics 9, no. 3 (March 19, 2020): 502. http://dx.doi.org/10.3390/electronics9030502.
Full textSaha, Himadri Nath, Rohit Singh, Debika Bhattacharyya, and P. K. Banerjee. "Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network." Foundations of Computing and Decision Sciences 40, no. 4 (December 1, 2015): 267–98. http://dx.doi.org/10.1515/fcds-2015-0016.
Full textMalviya, Taruna, and Khushboo Sawant. "Impact of Vampire Attack on Performance of Wireless Sensor Networks: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 96. http://dx.doi.org/10.23956/ijarcsse.v7i8.31.
Full textWei, Dengfeng, and Qing-Ju Jiao. "A Novel Core-Peer Based Trust Model for Peer-to-Peer Networks." Journal of Computational and Theoretical Nanoscience 14, no. 1 (January 1, 2017): 114–18. http://dx.doi.org/10.1166/jctn.2017.6135.
Full textFabrice, Sibomana. "DETECTIONAND PREVENTIONOF MALICIOUS NODE BASED ON NODE BEHAVIOUR IN MANET." International Journal of Advanced Research in Computer Science 8, no. 9 (September 30, 2017): 774–77. http://dx.doi.org/10.26483/ijarcs.v8i9.5213.
Full textLiu, Yi, Ruihui Zhao, Jiawen Kang, Abdulsalam Yassine, Dusit Niyato, and Jialiang Peng. "Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things." ACM Transactions on Internet Technology 22, no. 3 (August 31, 2022): 1–22. http://dx.doi.org/10.1145/3453169.
Full textRehman, Eid, Muhammad Sher, Syed Hussnain Abbas Naqvi, Khan Badar Khan, and Kamran Ullah. "Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network." Journal of Computer Networks and Communications 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/1630673.
Full textAranganathan, A., and C. D. Suriyakala. "Intelligent agents based trusted revocation for securing clustering MANETS." APTIKOM Journal on Computer Science and Information Technologies 3, no. 1 (January 22, 2020): 1–5. http://dx.doi.org/10.34306/csit.v3i1.75.
Full textAranganathan, A., and C. D. Suriyakala. "Intelligent agents based trusted revocation for securing clustering MANETS." APTIKOM Journal on Computer Science and Information Technologies 3, no. 1 (March 1, 2018): 1–5. http://dx.doi.org/10.11591/aptikom.j.csit.79.
Full textZhao, Junwei, and Xi Chen. "An Opinion Evolution Model Based on Heterogeneous Benefit with Malicious Nodes Added." Complexity 2021 (April 16, 2021): 1–9. http://dx.doi.org/10.1155/2021/6642698.
Full textSu, Zhen Zhen, Er Kun Sun, Xiao Gang Qi, Ying Nie, Wei Hong Lin, and Man De Xie. "A Security Routing Protocol Based on Convergence Degree and Trust." Applied Mechanics and Materials 519-520 (February 2014): 155–59. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.155.
Full textO., Amusan, Thompson A. F., Aderinola T. B., and Alese B. K. "Modelling Malicious Attack in Social Networks." Network and Communication Technologies 5, no. 1 (February 6, 2020): 37. http://dx.doi.org/10.5539/nct.v5n1p37.
Full textAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (September 1, 2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Full text