Design and analysis of probing route to defense sink-hole attacks for Internet of Things security

Y Liu, M Ma, X Liu, NN Xiong, A Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
… The Sinkhole attack is such an attack that … Sinkhole and its attack range In this section, we
first analyze the attack behaviour of sinkhole and the reasons why it is difficult to resist the sink

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

M Wazid, AK Das, S Kumari… - Security and …, 2016 - Wiley Online Library
… Among these hole attacks, the sinkhole attack is the malignant one. A … provide mathematical
analysis of our scheme for the traffic model. In Section 5, through the security analysis, we …

A multidisciplinary approach in sinkhole analysis: The Quinis village case study (NE-Italy)

L Zini, C Calligaris, E Forte, L Petronio, E Zavagno… - Engineering …, 2015 - Elsevier
… In this paper the Authors analyse a small area located in the Quinis village (Friuli Venezia
Giulia Region, NE Italy), applying and integrating multiple techniques to define the causes and …

A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis

F Le Fessant, A Papadimitriou, AC Viana… - Computer …, 2012 - Elsevier
… Second, we present the novel design and evaluation of two … together with a detailed analysis
of the cryptographic overhead (… This paper focuses particularly on sink-hole and selective …

Identification and quantitative analysis of sinkhole contributing factors in Florida's Karst

BH Nam, YJ Kim, H Youn - Engineering Geology, 2020 - Elsevier
… used as input variables to design a probabilistic sinkhole-prediction model at a regional
scale. The correlation analysis between the factors and sinkhole formation is essential prior to …

Designing efficient sinkhole attack detection mechanism in edge-based IoT deployment

S Pundir, M Wazid, DP Singh, AK Das, JJPC Rodrigues… - Sensors, 2020 - mdpi.com
… Thus, A can extract the stored sensitive information by applying power analysis attacks [12,13].
A can also install malicious sinkhole attack by launching script in the IoT devices which …

CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities

AK Sangaiah, A Javadpour, F Ja'fari, P Pinto… - Microprocessors and …, 2022 - Elsevier
… This study proposes a design for BC gateway that aimed to adapt and secure them against
the … Design and analysis of probing route to defense sink-hole attacks for internet of things …

Sinkhole hazards

F Gutiérrez - Oxford research encyclopedia of natural hazard …, 2016 - oxfordre.com
… assessment and the design of efficient mitigation measures. … The holes in the sinkhole walls
are ancient man-made caves. … The analysis of the sinkhole hazard also requires as much …

Three-dimensional sinkhole stability of spherical cavity

J Shiau, B Chudal, S Keawsawasvong - Acta Geotechnica, 2022 - Springer
… , though the sinkhole failures are … analysis. Numerical results are compared with the
two-dimensional axisymmetric results, and design charts presented to cover a wide range of design

[PDF][PDF] Sinkhole attack in wireless sensor networks-performance analysis and detection methods

R Baskar, K Raja, C Joseph, M Reji - Indian Journal of Science and …, 2017 - academia.edu
… is the major constraint while designing protocols and hardware, as … Attacks in sensor
network, and the analysis of the attack … In black hole attack the attacker drops or swallows all the …