An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN
Wireless sensor networks (WSN) were cataloged as one of the most important emerging
technologies of the last century and are considered the basis of the Internet of Things …
technologies of the last century and are considered the basis of the Internet of Things …
A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST
K Prathapchandran, T Janani - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) plays a vital role in many application domains like
battlefield surveillance, wildlife monitoring, disaster response, medical care, transportation …
battlefield surveillance, wildlife monitoring, disaster response, medical care, transportation …
[PDF][PDF] Identifying and improving the malicious behavior of rushing and blackhole attacks using proposed IDSAODV protocol
PN Ranchhodbhai, K Tripathi - International Journal of Recent …, 2019 - academia.edu
Wireless Ad hoc Network is established by a collection of mobile nodes without any fixed
infrastructure, where each node plays a role of the router. There are not any centralize …
infrastructure, where each node plays a role of the router. There are not any centralize …
Link prediction for identifying link failure using cross layer approach
VA Savalkar - 2018 2nd International Conference on Inventive …, 2018 - ieeexplore.ieee.org
Mobile Adhoc networks have been a popular research topic in the last few years due to their
many applications in the civil and military fields. The standard IEEE 802.11 and ordinary …
many applications in the civil and military fields. The standard IEEE 802.11 and ordinary …
DOS attacks on WSN and their classifications with countermeasures-a survey
Abstract Wireless Sensor Networks (WSN) is a network of sensors, actuators, mobile and
wearable devices that have processing and communication modules to monitor physical …
wearable devices that have processing and communication modules to monitor physical …
[PDF][PDF] Detection & prevention techniques of sinkhole attack in mobile adhoc network: a survey
NJ Patel - International Journal of Latest Research in Engineering …, 2016 - academia.edu
Sinkhole attack is one of severe kind of attack in wireless sensor network. Sinkhole attack
tries to attract network traffic toward them by advertising un-authorized routing updates and …
tries to attract network traffic toward them by advertising un-authorized routing updates and …
[PDF][PDF] RESULT BASED APPROACH ON INTRUSION DETECTION SYSTEM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS
EK Bansal, ER Sharma - deshbhagatuniversity.in
The sinkhole attack was the key problem in the proposed study, which was discovered and
eliminated by using an appropriate protocol such as AODV, or ad hoc on-demand distance …
eliminated by using an appropriate protocol such as AODV, or ad hoc on-demand distance …
Deteksi Sinkhole Attack pada MANET dengan Protokol Routing AODV Menggunakan Perbedaan Sequence Number
MN Wicaksono, DP Kartikasari… - … Teknologi Informasi dan …, 2020 - j-ptiik.ub.ac.id
Pada MANET yang menngunakan protokol routing AODV, routing table akan di-update
setiap kali ada permintaan dari node dalam jaringan. Hal ini dapat menimbulkan masalah …
setiap kali ada permintaan dari node dalam jaringan. Hal ini dapat menimbulkan masalah …
[HTML][HTML] A Novel Next Hop Selection Algorithm for Multi-Hop Wireless Sensor Networks
HM Ali - i-Manager's Journal on Wireless Communication …, 2017 - imanagerpublications.com
In this paper, the author has proposed a new route next-hop selection algorithm for Wireless
Sensor Networks (WSNs) that is aimed towards reducing packet loss, end-to-end delay, and …
Sensor Networks (WSNs) that is aimed towards reducing packet loss, end-to-end delay, and …