Adaptive security design with malicious node detection in cluster-based sensor networks

MY Hsieh, YM Huang, HC Chao - Computer Communications, 2007 - Elsevier
… cluster-based communication protocols with cryptographic protection against malicious
attackssecurity schemes in LEACH cannot resist vicious attacks from compromised nodes. Some …

Malicious node analysis in MANETS

T Jamal, SA Butt - International Journal of Information Technology, 2019 - Springer
… In the byzantine attack the insider nodes are turned into malicious nodes by some external
… actual nodes disrupt and transmit to malicious node. The Byzantine is very crucial attack in …

[PDF][PDF] A literature review of security attack in mobile ad-hoc networks

P Goyal, S Batra, A Singh - International Journal of Computer …, 2010 - academia.edu
… In this paper, we focus on fundamental security attacks in … network users and malicious
attackers. In the presence of … This type of attack can be launched by any malicious node that …

Network security and types of attacks in network

MV Pawar, J Anuradha - Procedia Computer Science, 2015 - Elsevier
… In denial of services attack, malicious node sending the message to the node and consume
… the malicious node is to be busy the network node. If a message from unauthenticated node

[PDF][PDF] Malicious node detection system for mobile ad hoc networks

A Rajaram, DS Palaniswami - International Journal of Computer Science …, 2010 - Citeseer
… , a malicious node can launch many attacks in a network by masquerading as another …
Black hole attack In a black hole attack a malicious node advertising itself as having a valid route …

[PDF][PDF] Malicious behaviour of node and its significant security techniques in MANET-A

BUI Khan, RF Olanrewaju… - Australian Journal of Basic …, 2013 - academia.edu
malicious node is that the nature of attacking policies are extremely hard to determine as
MANET doesn‟t have enough security … of malicious node, erroneous node, and selfish node is …

[PDF][PDF] A research on the malicious node detection in wireless sensor network

S Nagarjun, S Anand, S Sinha - International Journal of …, 2019 - researchgate.net
… Using common scenarios, we can spot an attack and a malicious node in the network. By …
security like detecting attack and malicious node in the network. This is one of the security

Malicious node identification strategy with environmental parameters

Z Teng, B Pang, C Du, Z Li - IEEE Access, 2020 - ieeexplore.ieee.org
… There will be sub attack malicious nodes and normal nodes in a relatively bad environment
… In this paper, we aim to identify malicious nodes, especially the sub attack malicious nodes

Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach

JM Chang, PC Tsou, I Woungang… - IEEE systems …, 2014 - ieeexplore.ieee.org
… In grayhole attacks, the malicious node is not initially recognized as such since it turns malicious
only at … 5; and we randomly select the malicious nodes to perform attacks in the network. …

An efficient and secure malicious node detection model for wireless sensor networks

AM Morsi, TM Barakat, AA Nashaat - International Journal of …, 2020 - papers.ssrn.com
… This paper conspicuously introduces an efficient and secure malicious node … mobile node.
WSNs are still suffering from some attacks like Man-in-the-Middle Attack and Black hole Attack