Trust mechanisms to secure routing in wireless sensor networks: Current state of the research and open research issues

F Ishmanov, Y Bin Zikria - Journal of Sensors, 2017 - Wiley Online Library
Routing is one of the most important operations in wireless sensor networks (WSNs) as it
deals with data delivery to base stations. Routing attacks can cripple it easily and degrade …

Robust and secure routing protocols for MANET-based internet of things systems—A survey

R Trivedi, P Khanpara - Emergence of Cyber Physical System and IoT in …, 2021 - Springer
In recent decades, the Internet of things (IoT) has had a huge impact on various domains,
such as logistics, health care, robotics, and manufacturing, coping with an enormous amount …

Reputation‐based cross‐layer intrusion detection system for wormhole attacks in wireless mesh networks

GR Karri, P Santhi Thilagam - Security and Communication …, 2014 - Wiley Online Library
Wireless mesh networks provide long‐distance wireless network connectivity over
heterogeneous devices for greater scalability and availability. However, protecting legitimate …

An effective analysis on intrusion detection systems in wireless mesh networks

KG Reddy, VP Raju… - … Conference on Advances …, 2017 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) are widely used to detect both known attacks and
unknown attacks performed by internal and external attackers in wireless networks …

Trusted routing in AODV protocol against wormhole attack

S Hazra, SK Setua - … , Application, and Service: FutureTech 2012 Volume 1, 2012 - Springer
This research aims to develop an enhanced version of AODV including trust and reputation
that will ensure the transmission of messages in a secure way avoiding wormhole attackers …

[PDF][PDF] International Journal of Trend in Scientific Research and Development (IJTSRD)

SV Nimkar, MR Vyawhare, VS Umap - 2018 - academia.edu
Accident is a term used to represent sudden fatal event with multiple reasons, persons,
properties and things evolved. The main cause of accidents by many researches is …

Un mecanismo de identificación de nodos basado en criptografía para la detección de la intrusión Wormhole en redes Ad-Hoc

CF Téllez Castaño - repositorio.unal.edu.co
Cuando hablamos de Redes Ad-Hoc, nos referimos a una tecnología que consiste en redes
de telecomunicación inalámbrica de topología dinámica, donde un conjunto de nodos …

[PDF][PDF] Security Technique And Congestion Avoidance In Wireless Mesh Networks

M Kaur - bizandbyte.com
Security in wireless network is one of the prime concern in today's Information Age, where
information is an asset not only to an organisation but also to an individual. Security to a …

[PDF][PDF] A Cryptography-Based Mechanism For Identifying Nodes Applied To Detection Of Wormhole Intrusion In Ad-Hoc Networks

CFT Castaño - Citeseer
When it comes to ad-hoc networks, we refer to a technology which consists of wireless
telecommunications network of dynamic topology, where a set of mobile communication …

[引用][C] PERFORMANCE EVALUATION OF WORM HOLE ATTACK ON AD HOC ON DEMAND MULTIPATH DISTANCE VECTOR ROUTING.

R DORAI - Journal of Theoretical & Applied Information …, 2014