Добірка наукової літератури з теми "Wormhole Attack Confirmation system"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Wormhole Attack Confirmation system".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Wormhole Attack Confirmation system"
Tiruvakadu, Divya Sai Keerthi, and Venkataram Pallapa. "Confirmation of wormhole attack in MANETs using honeypot." Computers & Security 76 (July 2018): 32–49. http://dx.doi.org/10.1016/j.cose.2018.02.004.
Повний текст джерелаSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.
Повний текст джерелаSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Повний текст джерелаNikam, Shahuraje, and Anshul Sarawagi. "Security over Wormhole Attack in VANET Network System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 196. http://dx.doi.org/10.23956/ijarcsse.v7i8.50.
Повний текст джерелаGhugar, Umashankar, and Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks." Computer Science and Information Technologies 2, no. 1 (March 1, 2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.
Повний текст джерелаDhanalakshmi.G, Irin Sherly S,. "Providing Immunity against Wormhole Attack in Wireless Network Coding System." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (February 28, 2015): 989–94. http://dx.doi.org/10.15680/ijircce.2015.0302040.
Повний текст джерелаJamali, Shahram, and Reza Fotohi. "Defending against Wormhole Attack in MANET Using an Artificial Immune System." New Review of Information Networking 21, no. 2 (July 2, 2016): 79–100. http://dx.doi.org/10.1080/13614576.2016.1247741.
Повний текст джерелаSundararajan, T. V. P., S. M. Ramesh, R. Maheswar, and K. R. Deepak. "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET." Wireless Networks 20, no. 4 (August 4, 2013): 563–78. http://dx.doi.org/10.1007/s11276-013-0623-8.
Повний текст джерелаBhosale, Snehal, and Harshal Patil. "Zigbee-Based Intrusion Detection System for Wormhole Attack in Internet of Things." Mathematical Modelling of Engineering Problems 10, no. 2 (April 28, 2023): 663–70. http://dx.doi.org/10.18280/mmep.100237.
Повний текст джерелаGupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (July 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.
Повний текст джерелаДисертації з теми "Wormhole Attack Confirmation system"
Gonçalves, Luís Pedro Morais. "Sistema de deteção de intrusões em ambientes IoT." Master's thesis, 2021. http://hdl.handle.net/10316/95492.
Повний текст джерелаO presente trabalho visa a mitigação da problemática associada à incidência de ataques Wormhole em redes operadas pelo protocolo de encaminhamento Routing Protocol for Low-Power and Lossy Networks (RPL). Este tipo de ataque pressupõe, tipicamente, a existência de pelo menos dois nós maliciosos na topologia que mantêm entre si uma ligação privada através da qual partilham pacotes legítimos. Esta prática motiva a que os nós que se encontrem nas imediações dos nós infetados assumam, erradamente, nós distantes como seus vizinhos. Ciente das limitações energéticas e computacionais dos dispositivos Internet of Things (IoT) e dado o seu vasto domínio aplicacional, torna-se importante o desenvolvimento de estratégias que promovam a segurança desta tecnologia. Neste seguimento, foi proposto um Intrusion Detection System (IDS), híbrido, baseado em assinaturas, vocacionado à identificação de ataques Wormhole neste tipo de ambiente. A estratégia de deteção desenvolvida passa pelo relacionamento da distância percorrida pelos pacotes, entre os nós remetente e destinatário, com a distância tida como referência para esse trajeto. Dado o seu princípio, o modelo pressupõe a previa determinação da distância entre nós vizinhos, bem como, a inclusão de novos campos nos pacotes em trânsito. A avaliação do sistema de deteção, por recurso a simulação com a ferramenta Cooja, mostrou resultados bastante satisfatórios no que concerne à capacidade de deteção de ataques e identificação de nós maliciosos, apresentando ainda um impacto energético perfeitamente admissível dado o domínio em que se aplica.
The present work approaches the problem associated with the incidence of Wormhole attacks in networks operated by the Routing Protocol for Low-Power and Lossy Networks (RPL). This type of attack typically assumes the existence of at least two malicious nodes in the topology that maintain a private connection used to broadcast legitimate packets. This practice motivates nodes that are in the vicinity of the infected nodes to mistakenly assume distant nodes as their neighbours. The energy and computational limitations of Internet of Things (IoT) devices and the vast application domain where they are used, motivate the development of strategies that promote the safety of this technology. Following this, a hybrid Intrusion Detection System (IDS), based on signatures, aimed at identifying Wormhole attacks in this type of environment was proposed. The detection strategy involves the relationship of the distance travelled by the packets, between the sender and recipient nodes, with the distance taken as a reference for this path. The operationalization of this model presupposes the prior determination of the distance between neighbouring nodes, and the inclusion of new fields in the packets in transit. The proposed IDS was evaluated using simulation with the Cooja tool and showed very satisfactory results in terms of the ability to detect attacks and identify malicious nodes. Regarding the energy impact of the solution, it was perfectly acceptable given the domain in which it applies.
Частини книг з теми "Wormhole Attack Confirmation system"
Dani, Virendra, Radha Bhonde, and Ayesha Mandloi. "iWAD: An Improved Wormhole Attack Detection System for Wireless Sensor Network." In Intelligent Systems Design and Applications, 1002–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96308-8_93.
Повний текст джерелаDeshmukh-Bhosale, Snehal, and S. S. Sonavane. "Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things." In Advances in Intelligent Systems and Computing, 513–23. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1081-6_44.
Повний текст джерелаCostantino, Domenico. "The Transgender: Legal Path to Surgery." In Practical Clinical Andrology, 283–89. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11701-5_22.
Повний текст джерелаGhugar, Umashankar, and Jayaram Pradhan. "Intrusion Detection System in Wireless Sensor Networks for Wormhole Attack Using Trust-Based System." In Handbook of Research on Information Security in Biomedical Signal Processing, 198–209. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5152-2.ch010.
Повний текст джерелаN., Ambika. "A Reliable Hybrid Blockchain-Based Authentication System for IoT Network." In Research Anthology on Convergence of Blockchain, Internet of Things, and Security, 181–92. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-7132-6.ch011.
Повний текст джерелаN., Ambika. "A Reliable Hybrid Blockchain-Based Authentication System for IoT Network." In Revolutionary Applications of Blockchain-Enabled Privacy and Access Control, 219–33. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7589-5.ch010.
Повний текст джерелаKaur, J., and S. Kaur. "A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network." In Research Anthology on Securing Mobile Technologies and Applications, 151–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch009.
Повний текст джерелаТези доповідей конференцій з теми "Wormhole Attack Confirmation system"
T, Divya Sai Keerthi, and Pallapa Venkataram. "Analysis of Wormhole Attack Confirmation System During Email Dumping Attack." In 7th International Conference on Computer Science, Engineering & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71104.
Повний текст джерелаAkila, A., D. Mahalakshmi, and C. Saranya. "Recovering system recital by noticing wormhole attack." In 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS). IEEE, 2016. http://dx.doi.org/10.1109/icetets.2016.7603016.
Повний текст джерелаBhawsar, Aditya, Yogadhar Pandey, and Upendra Singh. "Detection and Prevention of Wormhole Attack using the Trust-based Routing System." In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9156009.
Повний текст джерелаBinxiao Yu and Tongqiang Li. "Study of wormhole attack detecting based on local connectivity information in wireless sensor networks." In 2011 International Conference on Computer Science and Service System (CSSS). IEEE, 2011. http://dx.doi.org/10.1109/csss.2011.5974812.
Повний текст джерелаOjha, Manju, and Rajendra Singh Kushwah. "Improving Quality of Service of trust based system against wormhole attack by multi-path routing method." In 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489559.
Повний текст джерелаKhobragade, Supriya, and Puja Padiya. "Detection and prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network." In 2016 International conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, 2016. http://dx.doi.org/10.1109/scopes.2016.7955657.
Повний текст джерела