[PDF][PDF] A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction

J Katiravan - KSII Transactions on Internet and Information …, 2015 - koreascience.kr
Wireless sensor networks are often organized in the form of clusters leading to the new
framework of WSN called cluster or hierarchical WSN where each cluster head is …

Deep learning technique based intrusion detection in cyber-security networks

C Chethana, PK Pareek… - 2022 IEEE 2nd …, 2022 - ieeexplore.ieee.org
As a result of the inherent weaknesses of the wireless medium, ad hoc networks are
susceptible to a broad variety of threats and assaults. As a direct consequence of this …

A Hybrid Approach for Detecting and Preventing Security Attacks in MANETs

D Rajalakshmi, PS Immaculate… - … Conference on Self …, 2023 - ieeexplore.ieee.org
MANETs are new sort of organizational network that works in a profoundly powerful and
unusual atmosphere. Though the flexible nature of MANET is attractive, the dynamic …

[PDF][PDF] Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks

R Shree, SK Dwivedi, RP Pandey - International Journal of …, 2011 - academia.edu
Now a day, security in Mobile Ad hoc Network (MANET) is very important issue. Due to
dynamic topology and mobility of nodes, Mobile Ad hoc Networks are more vulnerable to …

An intrusion detection system for blackhole attack detection and isolation in RPL based IoT using ANN

C Prajisha, AR Vasudevan - International Advanced Computing …, 2021 - Springer
Abstract Routing Protocol for Low Power and Lossy Networks (RPL) is a simple and
lightweight routing protocol for Internet of Things (IoT). RPL-based IoT networks are prone to …

Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks

GG Gebremariam, J Panda, S Indu - Connection Science, 2023 - Taylor & Francis
Wireless sensor networks (WSNs) are an emerging military and civilian technology that uses
sensors. Sensor networks are hierarchical and chaotic in remote, unmonitored sites …

A trust based mechanism to combat blackhole attack in RPL protocol

N Bhalaji, KS Hariharasudan, K Aashika - ICICCT 2019–System Reliability …, 2020 - Springer
This article deals with a prime security attack-blackhole attack in Internet of Things networks
that uses the RPL in the network layer for routing of data packets. Latest studies indicate that …

[引用][C] Performance evaluation of wireless sensor network under black hole attack

G Gulhane, N Mahajan - Int. J. Comput. Technol, 2014

Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network

P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …

Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks

K Lakshmi Narayanan, R Santhana Krishnan… - Wireless Personal …, 2021 - Springer
Wireless sensor network allows nodes to communicate with another using wireless
channels so that it is necessary for packet delivery to the nodes. Black hole attack occurs …