4.5 Article

Network wormhole attacks without a traditional wormhole

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)

Muhannad Tahboush et al.

Summary: The paper proposes a hybrid wormhole attack detection (HWAD) algorithm that can detect in-band wormholes by performing round trip time (RTT) based on hop count and packet delivery ratio (PDR), as well as out-of-band wormholes through transmission range between successive nodes in a more optimistic manner. HWAD reduces delay and energy consumption by avoiding performing wormhole detections for all available nodes in the network. The proposed algorithm outperforms in wormhole detection compared to other algorithms.

IEEE ACCESS (2021)

Article Computer Science, Software Engineering

JGraphT-A Java Library for Graph Data Structures and Algorithms

Dimitrios Michail et al.

ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE (2020)

Article Computer Science, Information Systems

LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks

Pallavi Kaliyar et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks

Ohida Rufai Ahutu et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks

Mahsa Ghaznavi et al.

COMPUTER COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Network bottlenecks in OLSR based ad-hoc networks

Nadav Schweitzer et al.

AD HOC NETWORKS (2019)

Article Computer Science, Information Systems

A channel hopping based defense method against primary user emulation attack in cognitive radio networks

Arash Ahmadfard et al.

COMPUTER COMMUNICATIONS (2019)

Article Computer Science, Information Systems

CREDND: A Novel Secure Neighbor Discovery Algorithm for Wormhole Attack

Xiao Luo et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Routing Attacks and Mitigation Methods for RPL-Based Internet of Things

Ahmed Raoof et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Confirmation of wormhole attack in MANETs using honeypot

Divya Sai Keerthi Tiruvakadu et al.

COMPUTERS & SECURITY (2018)

Review Computer Science, Hardware & Architecture

Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey

Gao Liu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

A Survey of the State-of-the-Art Localization Techniques and Their Potentials for Autonomous Vehicle Applications

Sampo Kuutti et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks

Nadav Schweitzer et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2017)

Article Telecommunications

Wormhole Attack Detection Technique in Mobile Ad Hoc Networks

Parvinder Kaur et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Chemistry, Multidisciplinary

Future of IoT Networks: A Survey

Suk Kyu Lee et al.

APPLIED SCIENCES-BASEL (2017)

Review Computer Science, Information Systems

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

Tasnuva Mahjabin et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2017)

Article Computer Science, Information Systems

Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes

Nadav Schweitzer et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2016)

Proceedings Paper Computer Science, Theory & Methods

Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol

Parmar Amish et al.

PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016 (2016)

Article Computer Science, Artificial Intelligence

Game theoretic approach to optimize the throughput of cognitive radio networks in physical layer attacks

Arash Ahmadfard et al.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

Maximum Damage Malware Attack in Mobile Wireless Networks

M. H. R. Khouzani et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2012)

Proceedings Paper Computer Science, Hardware & Architecture

Hidden Markov Model for shortest paths testing to detect a Wormhole Attack in a localized Wireless Sensor Network.

Victor Obado et al.

ANT 2012 AND MOBIWIS 2012 (2012)

Article Automation & Control Systems

Maximum Damage Battery Depletion Attack in Mobile Sensor Networks

M. H. R. Khouzani et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2011)

Article Engineering, Electrical & Electronic

A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks

Majid Meghdadi et al.

IETE TECHNICAL REVIEW (2011)

Article Computer Science, Hardware & Architecture

DETECTING WORMHOLE ATTACKS IN DELAY-TOLERANT NETWORKS

Yanzhi Ren et al.

IEEE WIRELESS COMMUNICATIONS (2010)

Article Engineering, Electrical & Electronic

Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks

Majid Khabbazian et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Anthropology

Some unique properties of eigenvector centrality

Phillip Bonacich

SOCIAL NETWORKS (2007)

Article Computer Science, Information Systems

A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks

Radha Poovendran et al.

WIRELESS NETWORKS (2007)

Article Anthropology

A measure of betweenness centrality based on random walks

MEJ Newman

SOCIAL NETWORKS (2005)

Article Multidisciplinary Sciences

Community structure in social and biological networks

M Girvan et al.

PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2002)