Detection and prevention of Black Hole Attacks in IOT & WSN
Wireless Sensor Network is the combination of small devices called sensor nodes, gateways
and software. These nodes use wireless medium for transmission and are capable to sense …
and software. These nodes use wireless medium for transmission and are capable to sense …
Toras: Trustworthy load-balanced opportunistic routing for asynchronous duty-cycled wsns
As opportunistic routing (OR) becomes more popular in low-duty wireless sensor networks
(WSNs), there is a greater demand for reliable and consistent data transmission. Only …
(WSNs), there is a greater demand for reliable and consistent data transmission. Only …
POWER: Probabilistic weight-based energy-efficient cluster routing for large-scale wireless sensor networks
Cluster-based routing has been regarded as an appealing technique with limited resources
for wireless sensor networks (WSNs) where dynamic clustering is a practical approach to …
for wireless sensor networks (WSNs) where dynamic clustering is a practical approach to …
Effectiveness of HT-assisted sinkhole and blackhole denial of service attacks targeting mesh networks-on-chip
There are ample opportunities at both design and manufacturing phases to meddle in a
many-core chip system, especially its underlining communication fabric, known as the …
many-core chip system, especially its underlining communication fabric, known as the …
Torp: load balanced reliable opportunistic routing for asynchronous wireless sensor networks
MUF Qaisar, X Wang, A Hawbani… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Opportunistic routing (OR) is gaining popularity in low-duty wireless sensor networks (WSN),
so the need for efficient and reliable data transmission is becoming more essential. Reliable …
so the need for efficient and reliable data transmission is becoming more essential. Reliable …
Black hole attack prevention scheme using a blockchain-block approach in SDN-enabled WSN
The success of software-defined networking (SDN) technology in the wired environment has
accelerated the research on the deployment of SDN in wireless sensor networks (WSN) …
accelerated the research on the deployment of SDN in wireless sensor networks (WSN) …
[PDF][PDF] Trust-based selfish node detection mechanism using beta distribution in wireless sensor network
V Kanchana Devi, R Ganesan - J. ICT Res. Appl, 2019 - pdfs.semanticscholar.org
Wireless sensor networks (WSNs) are placed in open environments for the collection of data
and are vulnerable to external and internal attacks. The cryptographic mechanisms …
and are vulnerable to external and internal attacks. The cryptographic mechanisms …
Hidden Markov Model with machine learning-based black hole attack identification in wireless sensor networks
K Balasubadra, XSA Shiny, PV Pramila… - … on Intelligent and …, 2023 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is lying to several attacks because the Black hole is
problematic to distinguish and protect. Impostor internments and re-programs block the …
problematic to distinguish and protect. Impostor internments and re-programs block the …
Development of protective scheme against collaborative black hole attacks in mobile ad hoc networks
Abstract Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices
that wish to communicate without any fixed infrastructure and predetermined organization of …
that wish to communicate without any fixed infrastructure and predetermined organization of …
Applying machine learning algorithms to improve intrusion detection system in IoV
Since the last decade, Internet of vehicles (IoV) keeps attracting the interest of researchers
and automakers with a growing variety of applications and services. The aim of these …
and automakers with a growing variety of applications and services. The aim of these …