An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN

K Ávila, P Sanmartin, D Jabba, J Gómez - Wireless Personal …, 2022 - Springer
Wireless sensor networks (WSN) were cataloged as one of the most important emerging
technologies of the last century and are considered the basis of the Internet of Things …

A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST

K Prathapchandran, T Janani - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) plays a vital role in many application domains like
battlefield surveillance, wildlife monitoring, disaster response, medical care, transportation …

[PDF][PDF] Identifying and improving the malicious behavior of rushing and blackhole attacks using proposed IDSAODV protocol

PN Ranchhodbhai, K Tripathi - International Journal of Recent …, 2019 - academia.edu
Wireless Ad hoc Network is established by a collection of mobile nodes without any fixed
infrastructure, where each node plays a role of the router. There are not any centralize …

Link prediction for identifying link failure using cross layer approach

VA Savalkar - 2018 2nd International Conference on Inventive …, 2018 - ieeexplore.ieee.org
Mobile Adhoc networks have been a popular research topic in the last few years due to their
many applications in the civil and military fields. The standard IEEE 802.11 and ordinary …

DOS attacks on WSN and their classifications with countermeasures-a survey

J Shahid, S Saleem, MN Qureshi - NUST Journal of …, 2016 - journals.nust.edu.pk
Abstract Wireless Sensor Networks (WSN) is a network of sensors, actuators, mobile and
wearable devices that have processing and communication modules to monitor physical …

[PDF][PDF] Detection & prevention techniques of sinkhole attack in mobile adhoc network: a survey

NJ Patel - International Journal of Latest Research in Engineering …, 2016 - academia.edu
Sinkhole attack is one of severe kind of attack in wireless sensor network. Sinkhole attack
tries to attract network traffic toward them by advertising un-authorized routing updates and …

[PDF][PDF] RESULT BASED APPROACH ON INTRUSION DETECTION SYSTEM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS

EK Bansal, ER Sharma - deshbhagatuniversity.in
The sinkhole attack was the key problem in the proposed study, which was discovered and
eliminated by using an appropriate protocol such as AODV, or ad hoc on-demand distance …

Deteksi Sinkhole Attack pada MANET dengan Protokol Routing AODV Menggunakan Perbedaan Sequence Number

MN Wicaksono, DP Kartikasari… - … Teknologi Informasi dan …, 2020 - j-ptiik.ub.ac.id
Pada MANET yang menngunakan protokol routing AODV, routing table akan di-update
setiap kali ada permintaan dari node dalam jaringan. Hal ini dapat menimbulkan masalah …

[HTML][HTML] A Novel Next Hop Selection Algorithm for Multi-Hop Wireless Sensor Networks

HM Ali - i-Manager's Journal on Wireless Communication …, 2017 - imanagerpublications.com
In this paper, the author has proposed a new route next-hop selection algorithm for Wireless
Sensor Networks (WSNs) that is aimed towards reducing packet loss, end-to-end delay, and …

[引用][C] Security analysis of routing protocols for wireless sensor networks

C John, C Wahi - International Journal of Applied Engineering Research, 2016