Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Wormhole detection and isolation"'
Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-22 (2024)
Abstract The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographic measures and derail the entire communication network. It is too difficult to prevent a priori; all the possible counterme
Externí odkaz:
https://doaj.org/article/110de36442c14269811771f0e4cc6a52
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Alshehri, Asma Hassan
Publikováno v:
PeerJ Computer Science; Aug2024, p1-22, 22p
Autor:
Banik, Arpita, Sanyal, Debarshi Kumar
Publikováno v:
2015 Annual IEEE India Conference (INDICON); 2015, p1-6, 6p
Autor:
Shin, Soo-Young, Halim, Eddy Hartono
Publikováno v:
2012 International Conference on ICT Convergence (ICTC); 1/ 1/2012, p781-786, 6p
Publikováno v:
International Journal of Parallel, Emergent & Distributed Systems; Oct2012, Vol. 27 Issue 5, p459-480, 22p, 4 Diagrams, 2 Charts, 9 Graphs
Autor:
Roy, A. Thomas Paul
Publikováno v:
International Journal of Advanced Research in Computer Science; May/Jun2012, Vol. 3 Issue 3, p354-360, 7p
Publikováno v:
NAS
Ad hoc networks are promising but are vulnerable to selfish and malicious attacks. One kind of malicious attack, hidden wormhole attacks, can be mounted easily and be immune to cryptographic techniques. Wormholes distort network topology, and degrade
Autor:
X.D. Yu
Selected, peer reviewed papers from the 2013 International Conference on Vehicle & Mechanical Engineering and Information Technology (VMEIT 2013), August 17-18, 2013, Zhengzhou, Henan, China