Academic literature on the topic 'Wormhole Attack Confirmation system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wormhole Attack Confirmation system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wormhole Attack Confirmation system"

1

Tiruvakadu, Divya Sai Keerthi, and Venkataram Pallapa. "Confirmation of wormhole attack in MANETs using honeypot." Computers & Security 76 (July 2018): 32–49. http://dx.doi.org/10.1016/j.cose.2018.02.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.

Full text
Abstract:
In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack). For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.

Full text
Abstract:
Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time delay probability and packet loss probability of the established path in order to find the value of wormhole presence probability. The nodes in the path are given different ranking and subsequently colors according to their behavior. The most striking feature of WRHT consists of its capacity to defend against almost all categories of wormhole attacks without depending on any required additional hardware such as global positioning system, timing information or synchronized clocks, and traditional cryptographic schemes demanding high computational needs. The experimental results clearly indicate that the proposed technique has significant improvement over the existing wormhole attack detection techniques.
APA, Harvard, Vancouver, ISO, and other styles
4

Nikam, Shahuraje, and Anshul Sarawagi. "Security over Wormhole Attack in VANET Network System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 196. http://dx.doi.org/10.23956/ijarcsse.v7i8.50.

Full text
Abstract:
VANET plays important role while dealing with different vehicle communication. Security threats are always rising while working with heavy and public network. In past technique different dissemination techniques were introduced which deals with the security and proper communication in between the nodes and traffic. In this paper, previous approach over the data transmission is performed which deals with the lacking of security terms. Here a presentation of secure ECC with dynamic heuristic approach is presented which exhibit proper performance parameter while communicating in VANET network
APA, Harvard, Vancouver, ISO, and other styles
5

Ghugar, Umashankar, and Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks." Computer Science and Information Technologies 2, no. 1 (March 1, 2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.

Full text
Abstract:
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Dhanalakshmi.G, Irin Sherly S,. "Providing Immunity against Wormhole Attack in Wireless Network Coding System." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (February 28, 2015): 989–94. http://dx.doi.org/10.15680/ijircce.2015.0302040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jamali, Shahram, and Reza Fotohi. "Defending against Wormhole Attack in MANET Using an Artificial Immune System." New Review of Information Networking 21, no. 2 (July 2, 2016): 79–100. http://dx.doi.org/10.1080/13614576.2016.1247741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sundararajan, T. V. P., S. M. Ramesh, R. Maheswar, and K. R. Deepak. "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET." Wireless Networks 20, no. 4 (August 4, 2013): 563–78. http://dx.doi.org/10.1007/s11276-013-0623-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bhosale, Snehal, and Harshal Patil. "Zigbee-Based Intrusion Detection System for Wormhole Attack in Internet of Things." Mathematical Modelling of Engineering Problems 10, no. 2 (April 28, 2023): 663–70. http://dx.doi.org/10.18280/mmep.100237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (July 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.

Full text
Abstract:
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of this method is authenticating the POS terminals by an authentication server to bind the generated token to a single POS machine. To secure the system from eavesdropping attack, the data transmitted between the user device and the machine is encrypted by using the Elgamal encryption method. The keys used in the method are dynamic in nature. Furthermore, comparison and security analysis are presented with previously proposed systems.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Wormhole Attack Confirmation system"

1

Gonçalves, Luís Pedro Morais. "Sistema de deteção de intrusões em ambientes IoT." Master's thesis, 2021. http://hdl.handle.net/10316/95492.

Full text
Abstract:
Dissertação de Mestrado em Segurança Informática apresentada à Faculdade de Ciências e Tecnologia
O presente trabalho visa a mitigação da problemática associada à incidência de ataques Wormhole em redes operadas pelo protocolo de encaminhamento Routing Protocol for Low-Power and Lossy Networks (RPL). Este tipo de ataque pressupõe, tipicamente, a existência de pelo menos dois nós maliciosos na topologia que mantêm entre si uma ligação privada através da qual partilham pacotes legítimos. Esta prática motiva a que os nós que se encontrem nas imediações dos nós infetados assumam, erradamente, nós distantes como seus vizinhos. Ciente das limitações energéticas e computacionais dos dispositivos Internet of Things (IoT) e dado o seu vasto domínio aplicacional, torna-se importante o desenvolvimento de estratégias que promovam a segurança desta tecnologia. Neste seguimento, foi proposto um Intrusion Detection System (IDS), híbrido, baseado em assinaturas, vocacionado à identificação de ataques Wormhole neste tipo de ambiente. A estratégia de deteção desenvolvida passa pelo relacionamento da distância percorrida pelos pacotes, entre os nós remetente e destinatário, com a distância tida como referência para esse trajeto. Dado o seu princípio, o modelo pressupõe a previa determinação da distância entre nós vizinhos, bem como, a inclusão de novos campos nos pacotes em trânsito. A avaliação do sistema de deteção, por recurso a simulação com a ferramenta Cooja, mostrou resultados bastante satisfatórios no que concerne à capacidade de deteção de ataques e identificação de nós maliciosos, apresentando ainda um impacto energético perfeitamente admissível dado o domínio em que se aplica.
The present work approaches the problem associated with the incidence of Wormhole attacks in networks operated by the Routing Protocol for Low-Power and Lossy Networks (RPL). This type of attack typically assumes the existence of at least two malicious nodes in the topology that maintain a private connection used to broadcast legitimate packets. This practice motivates nodes that are in the vicinity of the infected nodes to mistakenly assume distant nodes as their neighbours. The energy and computational limitations of Internet of Things (IoT) devices and the vast application domain where they are used, motivate the development of strategies that promote the safety of this technology. Following this, a hybrid Intrusion Detection System (IDS), based on signatures, aimed at identifying Wormhole attacks in this type of environment was proposed. The detection strategy involves the relationship of the distance travelled by the packets, between the sender and recipient nodes, with the distance taken as a reference for this path. The operationalization of this model presupposes the prior determination of the distance between neighbouring nodes, and the inclusion of new fields in the packets in transit. The proposed IDS was evaluated using simulation with the Cooja tool and showed very satisfactory results in terms of the ability to detect attacks and identify malicious nodes. Regarding the energy impact of the solution, it was perfectly acceptable given the domain in which it applies.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wormhole Attack Confirmation system"

1

Dani, Virendra, Radha Bhonde, and Ayesha Mandloi. "iWAD: An Improved Wormhole Attack Detection System for Wireless Sensor Network." In Intelligent Systems Design and Applications, 1002–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96308-8_93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deshmukh-Bhosale, Snehal, and S. S. Sonavane. "Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things." In Advances in Intelligent Systems and Computing, 513–23. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1081-6_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Costantino, Domenico. "The Transgender: Legal Path to Surgery." In Practical Clinical Andrology, 283–89. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11701-5_22.

Full text
Abstract:
AbstractThe right to gender identity starts from the need to recognize to individuals a right to self-determination that is considered, in the private and family field, absolute and insusceptible of conditions and limits to its exercise, in the sense that it pertains to that field of freedom that the legal system must protect from aggression, and that it itself cannot attack. Law no. 164 of 14 April 1982 lays down rules on the rectification of the attribution of sex, for a complete regulation of the procedural aspects of the relevant procedure. According to Court of Cassation 20 July 2015 no. 15138, the desire to realize a coincidence between soma and psyche is the result of an elaboration of one’s gender identity, realized with the support of necessary medical and psychological treatments and the path of adaptation is a process of self-determination. In light of constitutional jurisprudence, the rectification of the personal data of the attribution of sex is possible, only on the medico-legal confirmation of the so-called gender dysphoria, even, that is, in the absence of a preventive surgical intervention to adapt the primary sexual characteristics to the “psychic sex.” It is left to the free and unquestionable will of the individual, the decision whether or not to precede the request for rectification of the registry from the submission to the surgical reassignment of the sex.
APA, Harvard, Vancouver, ISO, and other styles
4

Ghugar, Umashankar, and Jayaram Pradhan. "Intrusion Detection System in Wireless Sensor Networks for Wormhole Attack Using Trust-Based System." In Handbook of Research on Information Security in Biomedical Signal Processing, 198–209. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5152-2.ch010.

Full text
Abstract:
Intrusion detection in wireless sensor network (WSN) has been a critical issue for the stable functioning of the networks during last decade. Wireless sensors are small and cheap devices that have a capacity to sense actions, data movement, and communicate with each other. It is a self-governing network that consists of sensor nodes deployed in a particular environment, which has wide applications in various areas such as data gathering, military surveillance, transportation, medical system, agriculture, smart building, satellite communication, and healthcare. Wormhole attack is one of the serious attacks, which is smoothly resolved in networks but difficult to observe. There are various techniques used to detect the malicious node such as LITEWORP, SAM, DelPHI, GRPW, and WRHT. This chapter focuses on detection methods for wormhole attacks using trust-based systems in WSN.
APA, Harvard, Vancouver, ISO, and other styles
5

N., Ambika. "A Reliable Hybrid Blockchain-Based Authentication System for IoT Network." In Research Anthology on Convergence of Blockchain, Internet of Things, and Security, 181–92. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-7132-6.ch011.

Full text
Abstract:
IoT is an assembly of equipment of different calibers and functionality working towards a single goal. A blockchain is a computerized record that contains the whole history of exchanges made on the system. A multi-WSN arrangement model is structured. The hubs of the IoT are isolated into base stations, group heads, and conventional hubs as per their capacities, which encourage the administration and participation of the hubs. A hybrid blockchain model is proposed. To fit the multi-WSN arrange model better, as indicated by the various capacities and energies of various hubs, neighborhood blockchain and open blockchain are sent between group head hubs and base stations individually, and a crossbreed blockchain model is framed. A shared validation plot for IoT hubs is proposed. For group head hubs, the creators utilize the worldwide blockchain for validation, and for customary hubs, they utilize the nearby blockchain for confirmation. The proposal aims in increasing reliability by 1.17% and minimizes sinkhole attack by 2.42% compared to previous contribution.
APA, Harvard, Vancouver, ISO, and other styles
6

N., Ambika. "A Reliable Hybrid Blockchain-Based Authentication System for IoT Network." In Revolutionary Applications of Blockchain-Enabled Privacy and Access Control, 219–33. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7589-5.ch010.

Full text
Abstract:
IoT is an assembly of equipment of different calibers and functionality working towards a single goal. A blockchain is a computerized record that contains the whole history of exchanges made on the system. A multi-WSN arrangement model is structured. The hubs of the IoT are isolated into base stations, group heads, and conventional hubs as per their capacities, which encourage the administration and participation of the hubs. A hybrid blockchain model is proposed. To fit the multi-WSN arrange model better, as indicated by the various capacities and energies of various hubs, neighborhood blockchain and open blockchain are sent between group head hubs and base stations individually, and a crossbreed blockchain model is framed. A shared validation plot for IoT hubs is proposed. For group head hubs, the creators utilize the worldwide blockchain for validation, and for customary hubs, they utilize the nearby blockchain for confirmation. The proposal aims in increasing reliability by 1.17% and minimizes sinkhole attack by 2.42% compared to previous contribution.
APA, Harvard, Vancouver, ISO, and other styles
7

Kaur, J., and S. Kaur. "A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network." In Research Anthology on Securing Mobile Technologies and Applications, 151–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch009.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) are comprised of an arrangement of self-sorting mobile hosts furnished with wireless interaction devices gathered in groups without the need of any settled framework as well as centralized organization to maintain a system over radio connections. Every mobile node can react as a host and also, the router freely utilizes the wireless medium inside the correspondence range to deal with the interaction between huge quantities of individual mobile nodes by framing a correspondence system and trading the information among them without using any described group of the base station. A trust-based model in MANET estimates and sets up trust relationship among objectives. Trust-based routing is utilized to keep away data from different attackers like a wormhole, DOS, black-hole, selfish attack and so forth. Trust can be executed in different steps like reputation, subjective rationale and from the supposition of the neighboring node. A trust estimation approach not just watches the behavior of neighbor nodes, additionally it screens the transmission of the information packet in the identification of the route for exact estimation of trust value. A survey is carried out to find some of the limitations behind the existing works which has been done by the researchers to implement various approaches thus to build the trust management framework. Through the survey, it is observed that existing works focused only on the authenticated transmission of the message, how it transmits packets to the destination node securely using a trust-based scheme. And also, it is observed that the routing approach only focused on the key management issues. Certain limitation observed in the implemented approaches of existing work loses the reliability of framework. Thus, to withstand these issues it is necessary to establish a reliable security framework that protects the information exchanged among the users in a network while detecting various misbehaving attacks among the users. Confidentiality, as well as the integrity of information, can be secured by combining context-aware access control with trust management. The performance parameters should be evaluated with the previous works packet delivery ratio, packet drop, detection accuracy, number of false positives, and overhead.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wormhole Attack Confirmation system"

1

T, Divya Sai Keerthi, and Pallapa Venkataram. "Analysis of Wormhole Attack Confirmation System During Email Dumping Attack." In 7th International Conference on Computer Science, Engineering & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Akila, A., D. Mahalakshmi, and C. Saranya. "Recovering system recital by noticing wormhole attack." In 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS). IEEE, 2016. http://dx.doi.org/10.1109/icetets.2016.7603016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bhawsar, Aditya, Yogadhar Pandey, and Upendra Singh. "Detection and Prevention of Wormhole Attack using the Trust-based Routing System." In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9156009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Binxiao Yu and Tongqiang Li. "Study of wormhole attack detecting based on local connectivity information in wireless sensor networks." In 2011 International Conference on Computer Science and Service System (CSSS). IEEE, 2011. http://dx.doi.org/10.1109/csss.2011.5974812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ojha, Manju, and Rajendra Singh Kushwah. "Improving Quality of Service of trust based system against wormhole attack by multi-path routing method." In 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khobragade, Supriya, and Puja Padiya. "Detection and prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network." In 2016 International conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, 2016. http://dx.doi.org/10.1109/scopes.2016.7955657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography