Academic literature on the topic 'Wormhole Attack Confirmation system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wormhole Attack Confirmation system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wormhole Attack Confirmation system"

1

Tiruvakadu, Divya Sai Keerthi, and Venkataram Pallapa. "Confirmation of wormhole attack in MANETs using honeypot." Computers & Security 76 (July 2018): 32–49. http://dx.doi.org/10.1016/j.cose.2018.02.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.

Full text
Abstract:
In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wo
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.

Full text
Abstract:
Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time del
APA, Harvard, Vancouver, ISO, and other styles
4

Nikam, Shahuraje, and Anshul Sarawagi. "Security over Wormhole Attack in VANET Network System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 196. http://dx.doi.org/10.23956/ijarcsse.v7i8.50.

Full text
Abstract:
VANET plays important role while dealing with different vehicle communication. Security threats are always rising while working with heavy and public network. In past technique different dissemination techniques were introduced which deals with the security and proper communication in between the nodes and traffic. In this paper, previous approach over the data transmission is performed which deals with the lacking of security terms. Here a presentation of secure ECC with dynamic heuristic approach is presented which exhibit proper performance parameter while communicating in VANET network
APA, Harvard, Vancouver, ISO, and other styles
5

Ghugar, Umashankar, and Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks." Computer Science and Information Technologies 2, no. 1 (2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.

Full text
Abstract:
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Dhanalakshmi.G, Irin Sherly S,. "Providing Immunity against Wormhole Attack in Wireless Network Coding System." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (2015): 989–94. http://dx.doi.org/10.15680/ijircce.2015.0302040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jamali, Shahram, and Reza Fotohi. "Defending against Wormhole Attack in MANET Using an Artificial Immune System." New Review of Information Networking 21, no. 2 (2016): 79–100. http://dx.doi.org/10.1080/13614576.2016.1247741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sundararajan, T. V. P., S. M. Ramesh, R. Maheswar, and K. R. Deepak. "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET." Wireless Networks 20, no. 4 (2013): 563–78. http://dx.doi.org/10.1007/s11276-013-0623-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bhosale, Snehal, and Harshal Patil. "Zigbee-Based Intrusion Detection System for Wormhole Attack in Internet of Things." Mathematical Modelling of Engineering Problems 10, no. 2 (2023): 663–70. http://dx.doi.org/10.18280/mmep.100237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.

Full text
Abstract:
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of this method is authenticating the POS terminals by an authentication server to bind the generated token to a single POS machine. To secure the system from eavesdropping attack, the data transmitted between the user device and the machine is encrypted by using the Elgamal encryption method. The keys used in the method are dynamic in nature. Furthermore, comparison and sec
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!