Gotowa bibliografia na temat „Wormhole Attack Confirmation system”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Wormhole Attack Confirmation system”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Wormhole Attack Confirmation system"
Tiruvakadu, Divya Sai Keerthi, i Venkataram Pallapa. "Confirmation of wormhole attack in MANETs using honeypot". Computers & Security 76 (lipiec 2018): 32–49. http://dx.doi.org/10.1016/j.cose.2018.02.004.
Pełny tekst źródłaSingh, Rupinder, Jatinder Singh i Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks". Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.
Pełny tekst źródłaSingh, Rupinder, Jatinder Singh i Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks". Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Pełny tekst źródłaNikam, Shahuraje, i Anshul Sarawagi. "Security over Wormhole Attack in VANET Network System". International Journal of Advanced Research in Computer Science and Software Engineering 7, nr 8 (30.08.2017): 196. http://dx.doi.org/10.23956/ijarcsse.v7i8.50.
Pełny tekst źródłaGhugar, Umashankar, i Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks". Computer Science and Information Technologies 2, nr 1 (1.03.2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.
Pełny tekst źródłaDhanalakshmi.G, Irin Sherly S,. "Providing Immunity against Wormhole Attack in Wireless Network Coding System". International Journal of Innovative Research in Computer and Communication Engineering 03, nr 02 (28.02.2015): 989–94. http://dx.doi.org/10.15680/ijircce.2015.0302040.
Pełny tekst źródłaJamali, Shahram, i Reza Fotohi. "Defending against Wormhole Attack in MANET Using an Artificial Immune System". New Review of Information Networking 21, nr 2 (2.07.2016): 79–100. http://dx.doi.org/10.1080/13614576.2016.1247741.
Pełny tekst źródłaSundararajan, T. V. P., S. M. Ramesh, R. Maheswar i K. R. Deepak. "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET". Wireless Networks 20, nr 4 (4.08.2013): 563–78. http://dx.doi.org/10.1007/s11276-013-0623-8.
Pełny tekst źródłaBhosale, Snehal, i Harshal Patil. "Zigbee-Based Intrusion Detection System for Wormhole Attack in Internet of Things". Mathematical Modelling of Engineering Problems 10, nr 2 (28.04.2023): 663–70. http://dx.doi.org/10.18280/mmep.100237.
Pełny tekst źródłaGupta, Brij B., i Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server". Journal of Organizational and End User Computing 33, nr 2 (lipiec 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.
Pełny tekst źródłaRozprawy doktorskie na temat "Wormhole Attack Confirmation system"
Gonçalves, Luís Pedro Morais. "Sistema de deteção de intrusões em ambientes IoT". Master's thesis, 2021. http://hdl.handle.net/10316/95492.
Pełny tekst źródłaO presente trabalho visa a mitigação da problemática associada à incidência de ataques Wormhole em redes operadas pelo protocolo de encaminhamento Routing Protocol for Low-Power and Lossy Networks (RPL). Este tipo de ataque pressupõe, tipicamente, a existência de pelo menos dois nós maliciosos na topologia que mantêm entre si uma ligação privada através da qual partilham pacotes legítimos. Esta prática motiva a que os nós que se encontrem nas imediações dos nós infetados assumam, erradamente, nós distantes como seus vizinhos. Ciente das limitações energéticas e computacionais dos dispositivos Internet of Things (IoT) e dado o seu vasto domínio aplicacional, torna-se importante o desenvolvimento de estratégias que promovam a segurança desta tecnologia. Neste seguimento, foi proposto um Intrusion Detection System (IDS), híbrido, baseado em assinaturas, vocacionado à identificação de ataques Wormhole neste tipo de ambiente. A estratégia de deteção desenvolvida passa pelo relacionamento da distância percorrida pelos pacotes, entre os nós remetente e destinatário, com a distância tida como referência para esse trajeto. Dado o seu princípio, o modelo pressupõe a previa determinação da distância entre nós vizinhos, bem como, a inclusão de novos campos nos pacotes em trânsito. A avaliação do sistema de deteção, por recurso a simulação com a ferramenta Cooja, mostrou resultados bastante satisfatórios no que concerne à capacidade de deteção de ataques e identificação de nós maliciosos, apresentando ainda um impacto energético perfeitamente admissível dado o domínio em que se aplica.
The present work approaches the problem associated with the incidence of Wormhole attacks in networks operated by the Routing Protocol for Low-Power and Lossy Networks (RPL). This type of attack typically assumes the existence of at least two malicious nodes in the topology that maintain a private connection used to broadcast legitimate packets. This practice motivates nodes that are in the vicinity of the infected nodes to mistakenly assume distant nodes as their neighbours. The energy and computational limitations of Internet of Things (IoT) devices and the vast application domain where they are used, motivate the development of strategies that promote the safety of this technology. Following this, a hybrid Intrusion Detection System (IDS), based on signatures, aimed at identifying Wormhole attacks in this type of environment was proposed. The detection strategy involves the relationship of the distance travelled by the packets, between the sender and recipient nodes, with the distance taken as a reference for this path. The operationalization of this model presupposes the prior determination of the distance between neighbouring nodes, and the inclusion of new fields in the packets in transit. The proposed IDS was evaluated using simulation with the Cooja tool and showed very satisfactory results in terms of the ability to detect attacks and identify malicious nodes. Regarding the energy impact of the solution, it was perfectly acceptable given the domain in which it applies.
Części książek na temat "Wormhole Attack Confirmation system"
Dani, Virendra, Radha Bhonde i Ayesha Mandloi. "iWAD: An Improved Wormhole Attack Detection System for Wireless Sensor Network". W Intelligent Systems Design and Applications, 1002–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96308-8_93.
Pełny tekst źródłaDeshmukh-Bhosale, Snehal, i S. S. Sonavane. "Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things". W Advances in Intelligent Systems and Computing, 513–23. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1081-6_44.
Pełny tekst źródłaCostantino, Domenico. "The Transgender: Legal Path to Surgery". W Practical Clinical Andrology, 283–89. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11701-5_22.
Pełny tekst źródłaGhugar, Umashankar, i Jayaram Pradhan. "Intrusion Detection System in Wireless Sensor Networks for Wormhole Attack Using Trust-Based System". W Handbook of Research on Information Security in Biomedical Signal Processing, 198–209. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5152-2.ch010.
Pełny tekst źródłaN., Ambika. "A Reliable Hybrid Blockchain-Based Authentication System for IoT Network". W Research Anthology on Convergence of Blockchain, Internet of Things, and Security, 181–92. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-7132-6.ch011.
Pełny tekst źródłaN., Ambika. "A Reliable Hybrid Blockchain-Based Authentication System for IoT Network". W Revolutionary Applications of Blockchain-Enabled Privacy and Access Control, 219–33. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7589-5.ch010.
Pełny tekst źródłaKaur, J., i S. Kaur. "A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network". W Research Anthology on Securing Mobile Technologies and Applications, 151–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch009.
Pełny tekst źródłaStreszczenia konferencji na temat "Wormhole Attack Confirmation system"
T, Divya Sai Keerthi, i Pallapa Venkataram. "Analysis of Wormhole Attack Confirmation System During Email Dumping Attack". W 7th International Conference on Computer Science, Engineering & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71104.
Pełny tekst źródłaAkila, A., D. Mahalakshmi i C. Saranya. "Recovering system recital by noticing wormhole attack". W 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS). IEEE, 2016. http://dx.doi.org/10.1109/icetets.2016.7603016.
Pełny tekst źródłaBhawsar, Aditya, Yogadhar Pandey i Upendra Singh. "Detection and Prevention of Wormhole Attack using the Trust-based Routing System". W 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9156009.
Pełny tekst źródłaBinxiao Yu i Tongqiang Li. "Study of wormhole attack detecting based on local connectivity information in wireless sensor networks". W 2011 International Conference on Computer Science and Service System (CSSS). IEEE, 2011. http://dx.doi.org/10.1109/csss.2011.5974812.
Pełny tekst źródłaOjha, Manju, i Rajendra Singh Kushwah. "Improving Quality of Service of trust based system against wormhole attack by multi-path routing method". W 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489559.
Pełny tekst źródłaKhobragade, Supriya, i Puja Padiya. "Detection and prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network". W 2016 International conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, 2016. http://dx.doi.org/10.1109/scopes.2016.7955657.
Pełny tekst źródła