Academic literature on the topic 'Wormhole Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wormhole Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wormhole Attack"
Safitri, Nini Kurnia, Andy Hidayat Jatmika, and Moh Ali Albar. "Deteksi dan Pencegahan Serangan Wormhole pada Protokol Routing AOMDV menggunakan Gabungan Metode Delphi dan RTT-TC pada Jaringan MANET." Journal of Computer Science and Informatics Engineering (J-Cosine) 3, no. 1 (June 29, 2019): 49–55. http://dx.doi.org/10.29303/jcosine.v3i1.242.
Full textMukherjee, Saswati, Matangini Chattopadhyay, Samiran Chattopadhyay, and Pragma Kar. "Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/3405264.
Full textWu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.
Full textLuan, Liang Yu, Ying Fang Fu, Peng Xiao, and Ling Xi Peng. "Preventing Wormhole Attacks in Wireless Mesh Networks." Applied Mechanics and Materials 443 (October 2013): 440–45. http://dx.doi.org/10.4028/www.scientific.net/amm.443.440.
Full textK*, Parvathy. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 199–203. http://dx.doi.org/10.35940/ijrte.a5873.0510121.
Full textNeerugatti, Vikram, and A. Rama Mohan Reddy. "Acknowledgement Based Technique for Detection of the Wormhole Attack in RPL Based Internet of Things Networks." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 100–104. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2075.
Full textSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Full textPeda Gopi, A., E. Suresh Babu, C. Naga Raju, and S. Ashok Kumar. "Designing an Adversarial Model Against Reactive and Proactive Routing Protocols in MANETS: A Comparative Performance Study." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 5 (October 1, 2015): 1111. http://dx.doi.org/10.11591/ijece.v5i5.pp1111-1118.
Full textDivekar, Anuja Sanjay, Deepali Borade, and Vivek Bugad. "A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in IP network through LOLS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 3 (January 8, 2015): 5543–49. http://dx.doi.org/10.24297/ijct.v14i3.1998.
Full textRamírez Gómez, Julián, Héctor Fernando Vargas Montoya, and Álvaro León Henao. "Implementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Devices." Revista Colombiana de Computación 20, no. 1 (May 28, 2019): 41–58. http://dx.doi.org/10.29375/25392115.3606.
Full textDissertations / Theses on the topic "Wormhole Attack"
Gorlatova, Maria A. "Wormhole attack detection in wireless ad hoc networks." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27459.
Full textKarlsson, Jonny. "A unified wormhole attack detection framework for mobile ad hoc networks." Thesis, Open University, 2017. http://oro.open.ac.uk/48643/.
Full textThis thesis presents a new unified wormhole attack detection framework which is effective for all known wormhole types, alongside incurring low false positive rates, network loads and computational time, for a variety of diverse MANET scenarios. The framework makes three original technical contributions: i) a new accurate wormhole detection algorithm based on packet traversal time and hop count analysis (TTHCA) which identifies infected routes, ii) an enhanced, dynamic traversal time per hop analysis (TTpHA) detection model which is adaptable to node radio range fluctuations, and iii) a method for automatically detecting time measurement tampering in both TTHCA and TTpHA.
The thesis findings indicate that this new wormhole detection framework provides significant performance improvements compared to other existing solutions by accurately, efficiently and robustly detecting all wormhole variants under a wide range of network conditions.
Shaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.
Full textFebruary 2017
Tan, Hailun Computer Science & Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.
Full textGarcia, Luis Fernando. "Preventing layer-3 wormhole attacks in ad hoc networks with multipath DSR." Mémoire, École de technologie supérieure, 2009. http://espace.etsmtl.ca/48/1/GARCIA_Luis_Fernando.pdf.
Full textLee, Cheng-Jiun, and 李承駿. "A Study on Wormhole Attack in Mobile Ad hoc networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/m6p242.
Full text銘傳大學
資訊傳播工程學系碩士班
96
In Mobile Ad hoc Networks(MANET), because of lock some infrastructural to helping routing. Every source node need to use routing protocol to helping find the way to destination node. We notice that some famous routing protocols were focus on energy or transmission efficacy, almost have no resistances on malicious behavior. Although some security routing protocols was proposed to resist some malicious behavior. But still have some limitations to resist wormhole attack. Because of the behavior of wormhole attacker is hardly to recognized. So, we can say wormhole attack is one the most threatened attack in MANET. In this paper, we proposed an AODV based secure routing protocol, named AWAODV(avoid-wormhole AODV) to fight against wormhole. AWAODV used the concepts of multi-path routing, but it still transmission data with the only one path. AWAODV can not only detect wormhole node but also isolate these malicious nodes. This motivation is derived from the observation that wormhole node has extremely ability to attract the data packet get through itself. So their neighbors will deny forwarding any RREP from the suspicious node which anomaly value excess the threshold. After a period of time, such wormhole node will be isolated from the MANET.
CHU, TING-HUI, and 朱庭輝. "Wireless Ad hoc Network: Wormhole Attack Detection and Emergency Message Broadcast Strategy." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/uw725s.
Full text國立暨南國際大學
資訊工程學系
106
In recent years, the Vehicular ad hoc networks (VANETs) is a very popular research topic, and the information exchange can be grasped through the exchange of information between vehicles. In addition to the general exchange of information, the notification of urgent messages is even more important. The broadcast of emergency messages can be used to understand the driving situation early, avoid the blocked roads early, and quickly notify other vehicles after an emergency to avoid secondary accidents. This study proposes two kinds of emergency message broadcasting strategies. It is mainly the emergency message broadcast multi-hop communication protocol in the V2V communication mode. In both of our proposed methods 1 and 2, we hope to achieve a 100% acceptance rate of emergency messages and maintain a relatively low latency. Unlike many of the proposed studies, the pursuit of lower latency is actually lower than the human instinct. This study proposes a 100% acceptance rate, hoping to ensure that all vehicles are able to receive urgent messages, and secondly to reduce the delay time. In addition, wormhole attacks are a network security issue in wireless sensor networks (WSNs). After the nearby state is collected by the sensor, the data is transmitted to the collecting station by means of multi-hop transmission. However, a malicious attack will cause the sensor to establish an incorrect routing table and will not be able to return the data to the data station, causing the sensor power loss to shorten the service life. We propose a wormhole detection method that does not require the use of additional network equipment and does not require a lot of complex computations. Our method uses a change in the number of neighbors and a simple moving average (SMA) calculation to detect the presence of wormhole attacks in the scene, and uses the Quantum-inspired Tabu Search (QTS) algorithm with AND gates and OR gates to find the best detection rules. The experimental results show that our method has good detection performance.
Obado, Victor Owino. "A hidden Markov model process for wormhole attack detection in a localised underwater wireless sensor network." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000399.
Full textHE, KUAN-HSIEN, and 何冠賢. "Using Quantum-inspired Tabu Search Algorithm with logic operation and moving average for wormhole attack detection in WSN." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/33909415125878767549.
Full text國立暨南國際大學
資訊工程學系
105
Wireless sensor networks (WSN) are composed of sensors and applied in many fields, such as military, ecological and environmental monitoring. The wormhole attack problem is one of important security issues in WSN. The wormhole is consisted of one or more pairs of malicious nodes. When a node moves to the sensing range of the wormhole, it will receive the neighbor information through the special tunnel from the other wormhole. It may cause many problems such as packets routing error, reduce the lifetime of the sensor and let the entire of network topology damage. However, several methods have been proposed that using special hardware devices or lots of resource consumption. In this paper, we improve the method which utilizes the neighbor information collected by mobile nodes without extra hardware, complex calculation and lots of resource consumption. Using moving average (MA) indicator and combines with logic operation, AND gates and OR gates. And using Quantum-inspired Tabu Search (QTS) algorithm to effectively find the combinations to detect wormhole. However, we change an uncommon mobility model of nodes to a general one, and utilize the characteristic of mobility model to detect the node moves into the wormhole and out of the wormhole. Finally, the simulation results show that the proposed method with great performance uses less resources but still efficiently detects wormhole in different node density and transmission range.
JAO, MENG-HSIU, and 饒孟修. "A Novel Wormhole Attack Detection in WSN: Using Quantum Inspired Tabu Search Algorithm with Logic Operation and Moving Average." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/21802494897300450540.
Full text國立暨南國際大學
資訊工程學系
104
Wireless sensor networks (WSN) can be widely used in many areas, such as environment monitoring, weather forecasting, traffic control, etc. The wormhole attack problem is an important issue in WSN since it causes many problems, such as routing error, a reduction of sensor lifetime and broken network topology. Several wormhole detection approaches have been proposed, but most of them need special hardware devices and consume a lot of system resources. This paper proposes a novel and efficient method to detect the wormhole attack without hardware equipment or requiring much information about WSN. The proposed method uses a moving average (MA) indicator, which has been commonly used in financial fields, to apply to neighbors of sensor nodes; it becomes a dynamic detection indicator of the number of neighbor nodes. Furthermore, we design a fair calculation of detection rate. Because the combinations are too numerous to arrange, we utilize a Quantum-inspired Tabu Search (QTS) algorithm. This algorithm is efficient and effective in finding the ideal combination of detection indicators to detect wormhole attacks in different scenarios. It is a novel view to change the guide of QTS into searching the rules which have great performance on the situation that sensors meet wormhole and then compare with another. The simulation result shows our method is intuitive and efficiently detects wormhole in different maps which all have great performance.
Books on the topic "Wormhole Attack"
More sourcesBook chapters on the topic "Wormhole Attack"
Modirkhazeni, Ali, Norafida Ithnin, Mohammed M. Kadhum, and Teddy Mantoro. "Mitigation of Wormhole Attack in Wireless Sensor Networks." In Atlantis Ambient and Pervasive Intelligence, 109–47. Paris: Atlantis Press, 2012. http://dx.doi.org/10.2991/978-94-91216-71-8_7.
Full textHazra, Swarnali, and S. K. Setua. "Trusted Routing in AODV Protocol Against Wormhole Attack." In Lecture Notes in Electrical Engineering, 259–69. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-4516-2_26.
Full textYadav, Jyoti, and Mukesh Kumar. "Detection of Wormhole Attack in Wireless Sensor Networks." In Advances in Intelligent Systems and Computing, 243–50. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0129-1_26.
Full textAswale, Anjali B., and Radhika D. Joshi. "Security Enhancement by Preventing Wormhole Attack in MANET." In Lecture Notes in Networks and Systems, 225–37. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3172-9_23.
Full textKarapistoli, Eirini, Panagiotis Sarigiannidis, and Anastasios A. Economides. "Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 222–38. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23829-6_17.
Full textBagade, Sudhir, and Vijay Raisinghani. "JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET." In Information Systems Security, 444–58. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5_24.
Full textZhang, Yu, and Xin Feng. "Ad Hoc LAN Protocol-Based Defense Wormhole Attack Method." In Recent Advances in Computer Science and Information Engineering, 195–201. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25766-7_25.
Full textPatel, Manish, Akshai Aggarwal, and Nirbhay Chaubey. "Detection of Wormhole Attack in Static Wireless Sensor Networks." In Advances in Intelligent Systems and Computing, 463–71. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0344-9_39.
Full textDutta, Nishigandha, and Moirangthem Marjit Singh. "Wormhole Attack in Wireless Sensor Networks: A Critical Review." In Advanced Computing and Communication Technologies, 147–61. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0680-8_14.
Full textSingh, Pranav Kumar, Rahul Raj Gupta, Sunit Kumar Nandi, and Sukumar Nandi. "Machine Learning Based Approach to Detect Wormhole Attack in VANETs." In Advances in Intelligent Systems and Computing, 651–61. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15035-8_63.
Full textConference papers on the topic "Wormhole Attack"
Khan, Zubair Ahmed, and M. Hasan Islam. "Wormhole attack: A new detection technique." In 2012 International Conference on Emerging Technologies (ICET). IEEE, 2012. http://dx.doi.org/10.1109/icet.2012.6375443.
Full textPatel, Anal, Nimisha Patel, and Rajan Patel. "Defending against Wormhole Attack in MANET." In 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2015. http://dx.doi.org/10.1109/csnt.2015.253.
Full textT, Divya Sai Keerthi, and Pallapa Venkataram. "Analysis of Wormhole Attack Confirmation System During Email Dumping Attack." In 7th International Conference on Computer Science, Engineering & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71104.
Full textKeerthi, T. Divya Sai, and Pallapa Venkataram. "Locating the Attacker of Wormhole Attack by Using the Honeypot." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.196.
Full textSong, Ronggong, Peter C. Mason, and Ming Li. "Enhancement of frequency-based wormhole attack detection." In MILCOM 2011 - 2011 IEEE Military Communications Conference. IEEE, 2011. http://dx.doi.org/10.1109/milcom.2011.6127452.
Full textAkila, A., D. Mahalakshmi, and C. Saranya. "Recovering system recital by noticing wormhole attack." In 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS). IEEE, 2016. http://dx.doi.org/10.1109/icetets.2016.7603016.
Full textSharma, Madhu, Ashish Jain, and Shweta Shah. "Wormhole attack in mobile ad-hoc networks." In 2016 Symposium on Colossal Data Analysis and Networking (CDAN). IEEE, 2016. http://dx.doi.org/10.1109/cdan.2016.7570868.
Full textSarkar, Pratima, Chinmoy Kar, Biswaraj Sen, and Kalpana Sharma. "Sensitivity analysis on AODV with Wormhole attack." In 2016 2nd International Conference on Next Generation Computing Technologies (NGCT). IEEE, 2016. http://dx.doi.org/10.1109/ngct.2016.7877520.
Full textPatel, Mousam A., and Manish M. Patel. "Wormhole Attack Detection in Wireless Sensor Network." In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 2018. http://dx.doi.org/10.1109/icirca.2018.8597366.
Full textBendjima, Mostefa, and Mohammed Feham. "Wormhole attack detection in wireless sensor networks." In 2016 SAI Computing Conference (SAI). IEEE, 2016. http://dx.doi.org/10.1109/sai.2016.7556151.
Full text