Literatura académica sobre el tema "Wormhole Attack Confirmation system"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Wormhole Attack Confirmation system".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Wormhole Attack Confirmation system"
Tiruvakadu, Divya Sai Keerthi y Venkataram Pallapa. "Confirmation of wormhole attack in MANETs using honeypot". Computers & Security 76 (julio de 2018): 32–49. http://dx.doi.org/10.1016/j.cose.2018.02.004.
Texto completoSingh, Rupinder, Jatinder Singh y Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks". Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.
Texto completoSingh, Rupinder, Jatinder Singh y Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks". Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Texto completoNikam, Shahuraje y Anshul Sarawagi. "Security over Wormhole Attack in VANET Network System". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 8 (30 de agosto de 2017): 196. http://dx.doi.org/10.23956/ijarcsse.v7i8.50.
Texto completoGhugar, Umashankar y Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks". Computer Science and Information Technologies 2, n.º 1 (1 de marzo de 2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.
Texto completoDhanalakshmi.G, Irin Sherly S,. "Providing Immunity against Wormhole Attack in Wireless Network Coding System". International Journal of Innovative Research in Computer and Communication Engineering 03, n.º 02 (28 de febrero de 2015): 989–94. http://dx.doi.org/10.15680/ijircce.2015.0302040.
Texto completoJamali, Shahram y Reza Fotohi. "Defending against Wormhole Attack in MANET Using an Artificial Immune System". New Review of Information Networking 21, n.º 2 (2 de julio de 2016): 79–100. http://dx.doi.org/10.1080/13614576.2016.1247741.
Texto completoSundararajan, T. V. P., S. M. Ramesh, R. Maheswar y K. R. Deepak. "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET". Wireless Networks 20, n.º 4 (4 de agosto de 2013): 563–78. http://dx.doi.org/10.1007/s11276-013-0623-8.
Texto completoBhosale, Snehal y Harshal Patil. "Zigbee-Based Intrusion Detection System for Wormhole Attack in Internet of Things". Mathematical Modelling of Engineering Problems 10, n.º 2 (28 de abril de 2023): 663–70. http://dx.doi.org/10.18280/mmep.100237.
Texto completoGupta, Brij B. y Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server". Journal of Organizational and End User Computing 33, n.º 2 (julio de 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.
Texto completoTesis sobre el tema "Wormhole Attack Confirmation system"
Gonçalves, Luís Pedro Morais. "Sistema de deteção de intrusões em ambientes IoT". Master's thesis, 2021. http://hdl.handle.net/10316/95492.
Texto completoO presente trabalho visa a mitigação da problemática associada à incidência de ataques Wormhole em redes operadas pelo protocolo de encaminhamento Routing Protocol for Low-Power and Lossy Networks (RPL). Este tipo de ataque pressupõe, tipicamente, a existência de pelo menos dois nós maliciosos na topologia que mantêm entre si uma ligação privada através da qual partilham pacotes legítimos. Esta prática motiva a que os nós que se encontrem nas imediações dos nós infetados assumam, erradamente, nós distantes como seus vizinhos. Ciente das limitações energéticas e computacionais dos dispositivos Internet of Things (IoT) e dado o seu vasto domínio aplicacional, torna-se importante o desenvolvimento de estratégias que promovam a segurança desta tecnologia. Neste seguimento, foi proposto um Intrusion Detection System (IDS), híbrido, baseado em assinaturas, vocacionado à identificação de ataques Wormhole neste tipo de ambiente. A estratégia de deteção desenvolvida passa pelo relacionamento da distância percorrida pelos pacotes, entre os nós remetente e destinatário, com a distância tida como referência para esse trajeto. Dado o seu princípio, o modelo pressupõe a previa determinação da distância entre nós vizinhos, bem como, a inclusão de novos campos nos pacotes em trânsito. A avaliação do sistema de deteção, por recurso a simulação com a ferramenta Cooja, mostrou resultados bastante satisfatórios no que concerne à capacidade de deteção de ataques e identificação de nós maliciosos, apresentando ainda um impacto energético perfeitamente admissível dado o domínio em que se aplica.
The present work approaches the problem associated with the incidence of Wormhole attacks in networks operated by the Routing Protocol for Low-Power and Lossy Networks (RPL). This type of attack typically assumes the existence of at least two malicious nodes in the topology that maintain a private connection used to broadcast legitimate packets. This practice motivates nodes that are in the vicinity of the infected nodes to mistakenly assume distant nodes as their neighbours. The energy and computational limitations of Internet of Things (IoT) devices and the vast application domain where they are used, motivate the development of strategies that promote the safety of this technology. Following this, a hybrid Intrusion Detection System (IDS), based on signatures, aimed at identifying Wormhole attacks in this type of environment was proposed. The detection strategy involves the relationship of the distance travelled by the packets, between the sender and recipient nodes, with the distance taken as a reference for this path. The operationalization of this model presupposes the prior determination of the distance between neighbouring nodes, and the inclusion of new fields in the packets in transit. The proposed IDS was evaluated using simulation with the Cooja tool and showed very satisfactory results in terms of the ability to detect attacks and identify malicious nodes. Regarding the energy impact of the solution, it was perfectly acceptable given the domain in which it applies.
Capítulos de libros sobre el tema "Wormhole Attack Confirmation system"
Dani, Virendra, Radha Bhonde y Ayesha Mandloi. "iWAD: An Improved Wormhole Attack Detection System for Wireless Sensor Network". En Intelligent Systems Design and Applications, 1002–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96308-8_93.
Texto completoDeshmukh-Bhosale, Snehal y S. S. Sonavane. "Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things". En Advances in Intelligent Systems and Computing, 513–23. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1081-6_44.
Texto completoCostantino, Domenico. "The Transgender: Legal Path to Surgery". En Practical Clinical Andrology, 283–89. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11701-5_22.
Texto completoGhugar, Umashankar y Jayaram Pradhan. "Intrusion Detection System in Wireless Sensor Networks for Wormhole Attack Using Trust-Based System". En Handbook of Research on Information Security in Biomedical Signal Processing, 198–209. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5152-2.ch010.
Texto completoN., Ambika. "A Reliable Hybrid Blockchain-Based Authentication System for IoT Network". En Research Anthology on Convergence of Blockchain, Internet of Things, and Security, 181–92. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-7132-6.ch011.
Texto completoN., Ambika. "A Reliable Hybrid Blockchain-Based Authentication System for IoT Network". En Revolutionary Applications of Blockchain-Enabled Privacy and Access Control, 219–33. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7589-5.ch010.
Texto completoKaur, J. y S. Kaur. "A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network". En Research Anthology on Securing Mobile Technologies and Applications, 151–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch009.
Texto completoActas de conferencias sobre el tema "Wormhole Attack Confirmation system"
T, Divya Sai Keerthi y Pallapa Venkataram. "Analysis of Wormhole Attack Confirmation System During Email Dumping Attack". En 7th International Conference on Computer Science, Engineering & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71104.
Texto completoAkila, A., D. Mahalakshmi y C. Saranya. "Recovering system recital by noticing wormhole attack". En 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS). IEEE, 2016. http://dx.doi.org/10.1109/icetets.2016.7603016.
Texto completoBhawsar, Aditya, Yogadhar Pandey y Upendra Singh. "Detection and Prevention of Wormhole Attack using the Trust-based Routing System". En 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9156009.
Texto completoBinxiao Yu y Tongqiang Li. "Study of wormhole attack detecting based on local connectivity information in wireless sensor networks". En 2011 International Conference on Computer Science and Service System (CSSS). IEEE, 2011. http://dx.doi.org/10.1109/csss.2011.5974812.
Texto completoOjha, Manju y Rajendra Singh Kushwah. "Improving Quality of Service of trust based system against wormhole attack by multi-path routing method". En 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489559.
Texto completoKhobragade, Supriya y Puja Padiya. "Detection and prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network". En 2016 International conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, 2016. http://dx.doi.org/10.1109/scopes.2016.7955657.
Texto completo