Academic literature on the topic 'Wormhole Attack Confirmation system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wormhole Attack Confirmation system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wormhole Attack Confirmation system"
Tiruvakadu, Divya Sai Keerthi, and Venkataram Pallapa. "Confirmation of wormhole attack in MANETs using honeypot." Computers & Security 76 (July 2018): 32–49. http://dx.doi.org/10.1016/j.cose.2018.02.004.
Full textSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.
Full textSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Full textNikam, Shahuraje, and Anshul Sarawagi. "Security over Wormhole Attack in VANET Network System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 196. http://dx.doi.org/10.23956/ijarcsse.v7i8.50.
Full textGhugar, Umashankar, and Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks." Computer Science and Information Technologies 2, no. 1 (March 1, 2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.
Full textDhanalakshmi.G, Irin Sherly S,. "Providing Immunity against Wormhole Attack in Wireless Network Coding System." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (February 28, 2015): 989–94. http://dx.doi.org/10.15680/ijircce.2015.0302040.
Full textJamali, Shahram, and Reza Fotohi. "Defending against Wormhole Attack in MANET Using an Artificial Immune System." New Review of Information Networking 21, no. 2 (July 2, 2016): 79–100. http://dx.doi.org/10.1080/13614576.2016.1247741.
Full textSundararajan, T. V. P., S. M. Ramesh, R. Maheswar, and K. R. Deepak. "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET." Wireless Networks 20, no. 4 (August 4, 2013): 563–78. http://dx.doi.org/10.1007/s11276-013-0623-8.
Full textBhosale, Snehal, and Harshal Patil. "Zigbee-Based Intrusion Detection System for Wormhole Attack in Internet of Things." Mathematical Modelling of Engineering Problems 10, no. 2 (April 28, 2023): 663–70. http://dx.doi.org/10.18280/mmep.100237.
Full textGupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (July 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.
Full textDissertations / Theses on the topic "Wormhole Attack Confirmation system"
Gonçalves, Luís Pedro Morais. "Sistema de deteção de intrusões em ambientes IoT." Master's thesis, 2021. http://hdl.handle.net/10316/95492.
Full textO presente trabalho visa a mitigação da problemática associada à incidência de ataques Wormhole em redes operadas pelo protocolo de encaminhamento Routing Protocol for Low-Power and Lossy Networks (RPL). Este tipo de ataque pressupõe, tipicamente, a existência de pelo menos dois nós maliciosos na topologia que mantêm entre si uma ligação privada através da qual partilham pacotes legítimos. Esta prática motiva a que os nós que se encontrem nas imediações dos nós infetados assumam, erradamente, nós distantes como seus vizinhos. Ciente das limitações energéticas e computacionais dos dispositivos Internet of Things (IoT) e dado o seu vasto domínio aplicacional, torna-se importante o desenvolvimento de estratégias que promovam a segurança desta tecnologia. Neste seguimento, foi proposto um Intrusion Detection System (IDS), híbrido, baseado em assinaturas, vocacionado à identificação de ataques Wormhole neste tipo de ambiente. A estratégia de deteção desenvolvida passa pelo relacionamento da distância percorrida pelos pacotes, entre os nós remetente e destinatário, com a distância tida como referência para esse trajeto. Dado o seu princípio, o modelo pressupõe a previa determinação da distância entre nós vizinhos, bem como, a inclusão de novos campos nos pacotes em trânsito. A avaliação do sistema de deteção, por recurso a simulação com a ferramenta Cooja, mostrou resultados bastante satisfatórios no que concerne à capacidade de deteção de ataques e identificação de nós maliciosos, apresentando ainda um impacto energético perfeitamente admissível dado o domínio em que se aplica.
The present work approaches the problem associated with the incidence of Wormhole attacks in networks operated by the Routing Protocol for Low-Power and Lossy Networks (RPL). This type of attack typically assumes the existence of at least two malicious nodes in the topology that maintain a private connection used to broadcast legitimate packets. This practice motivates nodes that are in the vicinity of the infected nodes to mistakenly assume distant nodes as their neighbours. The energy and computational limitations of Internet of Things (IoT) devices and the vast application domain where they are used, motivate the development of strategies that promote the safety of this technology. Following this, a hybrid Intrusion Detection System (IDS), based on signatures, aimed at identifying Wormhole attacks in this type of environment was proposed. The detection strategy involves the relationship of the distance travelled by the packets, between the sender and recipient nodes, with the distance taken as a reference for this path. The operationalization of this model presupposes the prior determination of the distance between neighbouring nodes, and the inclusion of new fields in the packets in transit. The proposed IDS was evaluated using simulation with the Cooja tool and showed very satisfactory results in terms of the ability to detect attacks and identify malicious nodes. Regarding the energy impact of the solution, it was perfectly acceptable given the domain in which it applies.
Book chapters on the topic "Wormhole Attack Confirmation system"
Dani, Virendra, Radha Bhonde, and Ayesha Mandloi. "iWAD: An Improved Wormhole Attack Detection System for Wireless Sensor Network." In Intelligent Systems Design and Applications, 1002–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96308-8_93.
Full textDeshmukh-Bhosale, Snehal, and S. S. Sonavane. "Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things." In Advances in Intelligent Systems and Computing, 513–23. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1081-6_44.
Full textCostantino, Domenico. "The Transgender: Legal Path to Surgery." In Practical Clinical Andrology, 283–89. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11701-5_22.
Full textGhugar, Umashankar, and Jayaram Pradhan. "Intrusion Detection System in Wireless Sensor Networks for Wormhole Attack Using Trust-Based System." In Handbook of Research on Information Security in Biomedical Signal Processing, 198–209. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5152-2.ch010.
Full textN., Ambika. "A Reliable Hybrid Blockchain-Based Authentication System for IoT Network." In Research Anthology on Convergence of Blockchain, Internet of Things, and Security, 181–92. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-7132-6.ch011.
Full textN., Ambika. "A Reliable Hybrid Blockchain-Based Authentication System for IoT Network." In Revolutionary Applications of Blockchain-Enabled Privacy and Access Control, 219–33. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7589-5.ch010.
Full textKaur, J., and S. Kaur. "A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network." In Research Anthology on Securing Mobile Technologies and Applications, 151–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch009.
Full textConference papers on the topic "Wormhole Attack Confirmation system"
T, Divya Sai Keerthi, and Pallapa Venkataram. "Analysis of Wormhole Attack Confirmation System During Email Dumping Attack." In 7th International Conference on Computer Science, Engineering & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71104.
Full textAkila, A., D. Mahalakshmi, and C. Saranya. "Recovering system recital by noticing wormhole attack." In 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS). IEEE, 2016. http://dx.doi.org/10.1109/icetets.2016.7603016.
Full textBhawsar, Aditya, Yogadhar Pandey, and Upendra Singh. "Detection and Prevention of Wormhole Attack using the Trust-based Routing System." In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9156009.
Full textBinxiao Yu and Tongqiang Li. "Study of wormhole attack detecting based on local connectivity information in wireless sensor networks." In 2011 International Conference on Computer Science and Service System (CSSS). IEEE, 2011. http://dx.doi.org/10.1109/csss.2011.5974812.
Full textOjha, Manju, and Rajendra Singh Kushwah. "Improving Quality of Service of trust based system against wormhole attack by multi-path routing method." In 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489559.
Full textKhobragade, Supriya, and Puja Padiya. "Detection and prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network." In 2016 International conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, 2016. http://dx.doi.org/10.1109/scopes.2016.7955657.
Full text