Detection and prevention of Black Hole Attacks in IOT & WSN

S Ali, MA Khan, J Ahmad, AW Malik… - … conference on fog …, 2018 - ieeexplore.ieee.org
Wireless Sensor Network is the combination of small devices called sensor nodes, gateways
and software. These nodes use wireless medium for transmission and are capable to sense …

Toras: Trustworthy load-balanced opportunistic routing for asynchronous duty-cycled wsns

MUF Qaisar, X Wang, A Hawbani, A Khan… - IEEE Systems …, 2022 - ieeexplore.ieee.org
As opportunistic routing (OR) becomes more popular in low-duty wireless sensor networks
(WSNs), there is a greater demand for reliable and consistent data transmission. Only …

POWER: Probabilistic weight-based energy-efficient cluster routing for large-scale wireless sensor networks

MU Farooq, X Wang, A Hawbani, A Khan… - The Journal of …, 2022 - Springer
Cluster-based routing has been regarded as an appealing technique with limited resources
for wireless sensor networks (WSNs) where dynamic clustering is a practical approach to …

Effectiveness of HT-assisted sinkhole and blackhole denial of service attacks targeting mesh networks-on-chip

L Zhang, X Wang, Y Jiang, M Yang, T Mak… - Journal of Systems …, 2018 - Elsevier
There are ample opportunities at both design and manufacturing phases to meddle in a
many-core chip system, especially its underlining communication fabric, known as the …

Torp: load balanced reliable opportunistic routing for asynchronous wireless sensor networks

MUF Qaisar, X Wang, A Hawbani… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Opportunistic routing (OR) is gaining popularity in low-duty wireless sensor networks (WSN),
so the need for efficient and reliable data transmission is becoming more essential. Reliable …

Black hole attack prevention scheme using a blockchain-block approach in SDN-enabled WSN

E Karakoç, C Çeken - International Journal of Ad Hoc and …, 2021 - inderscienceonline.com
The success of software-defined networking (SDN) technology in the wired environment has
accelerated the research on the deployment of SDN in wireless sensor networks (WSN) …

[PDF][PDF] Trust-based selfish node detection mechanism using beta distribution in wireless sensor network

V Kanchana Devi, R Ganesan - J. ICT Res. Appl, 2019 - pdfs.semanticscholar.org
Wireless sensor networks (WSNs) are placed in open environments for the collection of data
and are vulnerable to external and internal attacks. The cryptographic mechanisms …

Hidden Markov Model with machine learning-based black hole attack identification in wireless sensor networks

K Balasubadra, XSA Shiny, PV Pramila… - … on Intelligent and …, 2023 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is lying to several attacks because the Black hole is
problematic to distinguish and protect. Impostor internments and re-programs block the …

Development of protective scheme against collaborative black hole attacks in mobile ad hoc networks

MU Farooq, X Wang, M Sajjad… - KSII Transactions on …, 2018 - koreascience.kr
Abstract Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices
that wish to communicate without any fixed infrastructure and predetermined organization of …

Applying machine learning algorithms to improve intrusion detection system in IoV

M Houmer, M Ouaissa, M Ouaissa… - Artificial Intelligence of …, 2022 - degruyter.com
Since the last decade, Internet of vehicles (IoV) keeps attracting the interest of researchers
and automakers with a growing variety of applications and services. The aim of these …