Malicious node analysis in MANETS

T Jamal, SA Butt - International Journal of Information Technology, 2019 - Springer
… In the byzantine attack the insider nodes are turned into malicious nodes by some external
… actual nodes disrupt and transmit to malicious node. The Byzantine is very crucial attack in …

[PDF][PDF] A research on the malicious node detection in wireless sensor network

S Nagarjun, S Anand, S Sinha - International Journal of …, 2019 - researchgate.net
… Using common scenarios, we can spot an attack and a malicious node in the network. By …
security like detecting attack and malicious node in the network. This is one of the security

An efficient and secure malicious node detection model for wireless sensor networks

AM Morsi, TM Barakat, AA Nashaat - International Journal of …, 2020 - papers.ssrn.com
… This paper conspicuously introduces an efficient and secure malicious node … mobile node.
WSNs are still suffering from some attacks like Man-in-the-Middle Attack and Black hole Attack

CMNTS: Catching malicious nodes with trust support in wireless sensor networks

U Prathap, PD Shenoy… - 2016 IEEE Region 10 …, 2016 - ieeexplore.ieee.org
… , and bad mouthing attack, and provided a solution to detect attacks. In literature, … attacks
but very few detect the malicious nodes effectively and also no single solution detects all attacks

A detection mechanism on malicious nodes in IoT

B Li, R Ye, G Gu, R Liang, W Liu, K Cai - Computer Communications, 2020 - Elsevier
… To detect the malicious nodes that carry out these attacks, we inject some probe packets
into the IoT and collect probe packets transmitted in the network. Since the probe packets are …

Malicious node and malicious observer node detection system in MANETs

S Durga Devi, D Rukmani Devi - … and Computation: Practice …, 2021 - Wiley Online Library
secure routing scheme is used to protect vigorous attacks. Provision of high anonymity and
security … used to find out the malicious nodes and guess their attack behavior. The detection …

Prevention of DoS attacks by detection of multiple malicious nodes in VANETs

S Kumar, KS Mann - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
… So with the proposed algorithm, we can detect multiple malicious nodes and we can
differentiate between the nodes who are sending the malicious and irrelevant packets and genuine …

Malicious nodes detection based on artificial neural network in IoT environments

MA Khatun, N Chowdhury… - 2019 22nd International …, 2019 - ieeexplore.ieee.org
… this work suggests a method of detecting malicious nodes in IoT environments. The contribution
… for various attacks. In this study, we consider the IoT security attacks as shown in Table I. …

Blockchain-based wireless sensor networks for malicious node detection: A survey

LK Ramasamy, FK KP, AL Imoize, JO Ogbebor… - IEEE …, 2021 - ieeexplore.ieee.org
… , and in-built security in opposition to DDoS attacks, blockchain has demonstrated safety …
are utilized and hinder malicious nodes from launching a DoS attack; creating numerous …

Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks

V Gomathy, N Padhy, D Samanta, M Sivaram… - Journal of Ambient …, 2020 - Springer
… The motivation of the paper is to design trust based secure network for detection of wormhole
and black hole attacks due to the presence of malicious nodes of Ad-hoc wireless sensor …