Journal articles on the topic 'Wormhole Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Wormhole Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Safitri, Nini Kurnia, Andy Hidayat Jatmika, and Moh Ali Albar. "Deteksi dan Pencegahan Serangan Wormhole pada Protokol Routing AOMDV menggunakan Gabungan Metode Delphi dan RTT-TC pada Jaringan MANET." Journal of Computer Science and Informatics Engineering (J-Cosine) 3, no. 1 (June 29, 2019): 49–55. http://dx.doi.org/10.29303/jcosine.v3i1.242.
Full textMukherjee, Saswati, Matangini Chattopadhyay, Samiran Chattopadhyay, and Pragma Kar. "Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/3405264.
Full textWu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.
Full textLuan, Liang Yu, Ying Fang Fu, Peng Xiao, and Ling Xi Peng. "Preventing Wormhole Attacks in Wireless Mesh Networks." Applied Mechanics and Materials 443 (October 2013): 440–45. http://dx.doi.org/10.4028/www.scientific.net/amm.443.440.
Full textK*, Parvathy. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 199–203. http://dx.doi.org/10.35940/ijrte.a5873.0510121.
Full textNeerugatti, Vikram, and A. Rama Mohan Reddy. "Acknowledgement Based Technique for Detection of the Wormhole Attack in RPL Based Internet of Things Networks." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 100–104. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2075.
Full textSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Full textPeda Gopi, A., E. Suresh Babu, C. Naga Raju, and S. Ashok Kumar. "Designing an Adversarial Model Against Reactive and Proactive Routing Protocols in MANETS: A Comparative Performance Study." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 5 (October 1, 2015): 1111. http://dx.doi.org/10.11591/ijece.v5i5.pp1111-1118.
Full textDivekar, Anuja Sanjay, Deepali Borade, and Vivek Bugad. "A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in IP network through LOLS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 3 (January 8, 2015): 5543–49. http://dx.doi.org/10.24297/ijct.v14i3.1998.
Full textRamírez Gómez, Julián, Héctor Fernando Vargas Montoya, and Álvaro León Henao. "Implementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Devices." Revista Colombiana de Computación 20, no. 1 (May 28, 2019): 41–58. http://dx.doi.org/10.29375/25392115.3606.
Full textSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.
Full textSingh, Surinder, and Hardeep Singh Saini. "Security Techniques for Wormhole Attack in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 2.23 (April 20, 2018): 59. http://dx.doi.org/10.14419/ijet.v7i2.23.11884.
Full textKhan, Zubair Ahmed, Saeed-ur - Rehman, and Muhammad Hasan Islam. "An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack." July 2016 35, no. 3 (July 1, 2016): 359–72. http://dx.doi.org/10.22581/muet1982.1603.06.
Full textMei, Song, Jiang Yuan, Feng Wu, and Wei Ling Wang. "A Wireless Wormhole Detection Model Based on Packet Leashes." Advanced Materials Research 660 (February 2013): 212–16. http://dx.doi.org/10.4028/www.scientific.net/amr.660.212.
Full textGhugar, Umashankar, and Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks." Computer Science and Information Technologies 2, no. 1 (March 1, 2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.
Full textAneja, Darpan, Love Kumar, and Vishal Sharma. "A Cluster Based Approach for Detection and Protection of Wormhole Attack in Wireless Sensor Network." Sensor Letters 17, no. 12 (December 1, 2019): 955–64. http://dx.doi.org/10.1166/sl.2019.4184.
Full textKadian, Garima, and Dinesh Singh. "Review Paper on Wormhole Attack." International Journal of Computer Applications 131, no. 13 (December 17, 2015): 26–31. http://dx.doi.org/10.5120/ijca2015907529.
Full textZheng, Zheng Jian. "A Wormhole Attack Defense Strategy of WSN Based on Node Location Information." Advanced Materials Research 268-270 (July 2011): 1055–60. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1055.
Full textRezaei, F., and A. Zahedi. "Dealing with Wormhole Attacks in Wireless Sensor Networks Through Discovering Separate Routes Between Nodes." Engineering, Technology & Applied Science Research 7, no. 4 (August 9, 2017): 1771–74. http://dx.doi.org/10.48084/etasr.1118.
Full textPalacharla, Swetha, M. Chandan, K. GnanaSuryaTeja, and G. Varshitha. "Wormhole Attack: a Major Security Concern in Internet of Things (Iot)." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 147. http://dx.doi.org/10.14419/ijet.v7i3.27.17748.
Full textLiang, Hong, Hong Fan, and Fu Cai. "Defending against wormhole attack in OLSR." Geo-spatial Information Science 9, no. 3 (January 2006): 229–33. http://dx.doi.org/10.1007/bf02826773.
Full textLiu, Shuan. "Exploration of Wireless Sensor Network Based on RSSI Positioning Algorithm." International Journal of Online Engineering (iJOE) 14, no. 11 (November 10, 2018): 133. http://dx.doi.org/10.3991/ijoe.v14i11.9519.
Full textSehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Impact of selective forwarding attack on AODV protocol in mobile wireless senor networks." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 157. http://dx.doi.org/10.14419/ijet.v7i2.4.13029.
Full textKori, Sharada, Krishnamurthy G N, and Nandini Sidnal. "Distributed Wormhole Attack Mitigation Technique in WSNs." International Journal of Computer Network and Information Security 11, no. 5 (May 8, 2019): 20–27. http://dx.doi.org/10.5815/ijcnis.2019.05.03.
Full textMariappan, L. Thanga, and K. Rubasoundar. "Isolating Wormhole Attack in Wireless Sensor Networks." Circuits and Systems 07, no. 08 (2016): 2036–46. http://dx.doi.org/10.4236/cs.2016.78177.
Full textChiu, Hon Sun, King-Shan Lui, and Kwan L. Yeung. "DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks." Journal of Communications Software and Systems 2, no. 2 (April 5, 2017): 131. http://dx.doi.org/10.24138/jcomss.v2i2.296.
Full textNgoc, Luong Thai, and Vo Thanh Tu. "A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS TO DETECT AND PREVENT MALICIOUS NODES IN MOBILE AD HOC NETWORK." Journal of Computer Science and Cybernetics 33, no. 4 (May 11, 2018): 357–78. http://dx.doi.org/10.15625/1813-9663/33/4/10759.
Full textMatam, Rakesh, and Somanath Tripathy. "Secure Multicast Routing Algorithm for Wireless Mesh Networks." Journal of Computer Networks and Communications 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/1563464.
Full textLiu, Shu, and Rui Jiang. "Security Analysis and Improvement of Secure and Dynamic Clustering Protocol." Applied Mechanics and Materials 48-49 (February 2011): 1014–17. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.1014.
Full textRaote, Nisha S. "Defending Wormhole Attack in Wireless Ad-hoc Network." International Journal of Computer Science & Engineering Survey 2, no. 3 (August 30, 2011): 143–48. http://dx.doi.org/10.5121/ijcses.2011.2311.
Full textDhara Buch and Devesh Jinwala. "Prevention of Wormhole Attack in Wireless Sensor Network." International Journal of Network Security & Its Applications 3, no. 5 (September 30, 2011): 85–98. http://dx.doi.org/10.5121/ijnsa.2011.3507.
Full textNikam, Shahuraje, and Anshul Sarawagi. "Security over Wormhole Attack in VANET Network System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 196. http://dx.doi.org/10.23956/ijarcsse.v7i8.50.
Full textAhmad, Gulzar, and Sanjay Jamwal. "Examination of AODV Routing Protocol with Wormhole Attack." International Journal of Computer Applications 135, no. 5 (February 17, 2016): 31–35. http://dx.doi.org/10.5120/ijca2016908415.
Full textTiruvakadu, Divya Sai Keerthi, and Venkataram Pallapa. "Confirmation of wormhole attack in MANETs using honeypot." Computers & Security 76 (July 2018): 32–49. http://dx.doi.org/10.1016/j.cose.2018.02.004.
Full textSharma, Vishal, Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, and Ravinder Kumar. "Coagulation Attacks over Networked UAVs: Concept, Challenges, and Research Aspects." International Journal of Engineering & Technology 7, no. 3.13 (July 27, 2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.13.17329.
Full textGandhi, Kaushal, Rajneesh Narula, Sumeer Khullar, and Anish Arora. "Security Issues of Routing Protocols in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (October 30, 2012): 339–42. http://dx.doi.org/10.24297/ijct.v3i2c.2894.
Full textRatnasih, Ratnasih, Doan Perdana, Triani Wulandari, and M. Irfan Pratama. "Performance Analysis of Reactive Routing Protocol on VANET with Wormhole Attack Schemeaper." JURNAL INFOTEL 10, no. 3 (August 28, 2018): 138. http://dx.doi.org/10.20895/infotel.v10i3.384.
Full textKumar, Mukesh, and Kamlesh Dutta. "Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN." International Journal of Information Security and Privacy 11, no. 1 (January 2017): 35–51. http://dx.doi.org/10.4018/ijisp.2017010103.
Full textSingh, Sukhwinder, and Rajnish Kansal. "Novel Technique for Detection of Wormhole Attack in MANET." International Journal of Computer Sciences and Engineering 6, no. 11 (November 30, 2018): 464–68. http://dx.doi.org/10.26438/ijcse/v6i11.464468.
Full textYang, Xiaoying, and Qixiang Song. "An Improved DV-Hop Algorithm for Resisting Wormhole Attack." Open Cybernetics & Systemics Journal 9, no. 1 (September 18, 2015): 1443–48. http://dx.doi.org/10.2174/1874110x01509011443.
Full textKr.Shrivastava, Ashish, and Neha Jain. "Study of Wormhole Attack in Mobile Ad-Hoc Network." International Journal of Computer Applications 73, no. 12 (July 26, 2013): 32–37. http://dx.doi.org/10.5120/12795-0138.
Full textGoyal, Sweety, and Harish Rohil. "Securing MANET against Wormhole Attack using Neighbor Node Analysis." International Journal of Computer Applications 81, no. 18 (November 22, 2013): 44–48. http://dx.doi.org/10.5120/14227-2478.
Full textSharif, Lukman, and Munir Ahmed. "The Wormhole Routing Attack in Wireless Sensor Networks (WSN)." Journal of Information Processing Systems 6, no. 2 (June 30, 2010): 177–84. http://dx.doi.org/10.3745/jips.2010.6.2.177.
Full textUpadhyay, Saurabh. "Avoiding Wormhole Attack in MANET using Statistical Analysis Approach." International Journal on Cryptography and Information Security 2, no. 1 (March 31, 2012): 15–23. http://dx.doi.org/10.5121/ijcis.2012.2102.
Full textKumar, Mohit, and Nidhi Shalya. "Securing AODV against Wormhole Attack using Token based Approach." International Journal of Applied Information Systems 4, no. 10 (December 15, 2012): 24–27. http://dx.doi.org/10.5120/ijais12-450807.
Full textSundaravadivel, K. "IMPLEMENTATION OF A CRYPTOGRAPHY TECHNIQUE TO PREVENT WORMHOLE ATTACK." ICTACT Journal on Communication Technology 10, no. 1 (March 1, 2019): 1929–35. http://dx.doi.org/10.21917/ijct.2019.0283.
Full textKaur, Parvinder, Dalveer Kaur, and Rajiv Mahajan. "Wormhole Attack Detection Technique in Mobile Ad Hoc Networks." Wireless Personal Communications 97, no. 2 (July 6, 2017): 2939–50. http://dx.doi.org/10.1007/s11277-017-4643-z.
Full textShrivastava, Akansha, and Rajni Dubey. "Wormhole Attack in Mobile Ad-hoc Network: A Survey." International Journal of Security and Its Applications 9, no. 7 (July 31, 2015): 293–98. http://dx.doi.org/10.14257/ijsia.2015.9.7.26.
Full textJi, Shiyu, Tingting Chen, and Sheng Zhong. "Wormhole Attack Detection Algorithms in Wireless Network Coding Systems." IEEE Transactions on Mobile Computing 14, no. 3 (March 1, 2015): 660–74. http://dx.doi.org/10.1109/tmc.2014.2324572.
Full textPahal, Vishal, and Susheel Kumar. "Degradation of Ad-hoc Network Performance under Wormhole Attack." International Journal of Computer Applications 49, no. 13 (July 28, 2012): 25–29. http://dx.doi.org/10.5120/7687-0997.
Full text