… attack, spoofing attack, denial of service attack, etc. [8, 9]. The current paper was focused on selective forwardingattack, and this attack will disrupt the network … selectively forward the …
S Benzarti, B Triki, O Korbaa - 2017 International conference on …, 2017 - ieeexplore.ieee.org
… networks and give a short definition. In section III we present the common attacks between two or more networks… Selective-Forwardingattack: A routing node has a main liability which is …
… This attack is somewhat similar to the selective forwardingattack, though only DIO messages are selected. This attack affects the network by changing in network topology, slightly …
D Eastman, SAP Kumar - 2017 IEEE 15th Intl Conf on …, 2017 - ieeexplore.ieee.org
… for both Sinkhole with Selective Forwardingattacks and Denial of Service attacks, while energy … attacks. Keywords— Internet of Things; Information Systems Security; Internet of Things …
… the network. There is also a variant of this attack called gray hole (or also selective forwarding attack) where the attacker only discards a specific subpart of the network traffic. 2) DAO …
MR Islam, KM Aktheruzzaman - Journal of Computer and …, 2020 - scirp.org
… Various types of selective forwardingattacks exist. For one type the … ) attack for that specific node or group of nodes [1]. “Neglect and greed” is another type of selective forwardingattack …
N Yang, K Chen, M Wang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
… the packet forwarding and … attacks through the forwarding strategy. 2) Design Goal: Consequently, in this work, we aim to develop a forwarding strategy that can thwart the two attacks …
O Yaman, B Sokat, T Ayav… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
… Ben Ayed, "An intrusion detection system for selective forwardingattack in IPv6-based mobile … protocol to detect selective forwardingattack in internet of Things," International Journal of …
… By monitoring the unusual things in the network and analyze them for further processes to reduce security issues are the objectives of intrusion detection systems. Intrusion detection …