Detection and prevention of black hole attack using trusted and secure routing in wireless sensor network

D Bisen, B Barmaiya, R Prasad, P Saurabh - Hybrid Intelligent Systems …, 2021 - Springer
A wireless sensor network (WSN) is a network of devices that can communicate after
gathering information by monitoring any region through wireless links. Due to this delicate …

Exponential trust based mechanism to detect black hole attack in wireless sensor network

DD Virmani, M Hemrajani, S Chandel - arXiv preprint arXiv:1401.2541, 2014 - arxiv.org
Security is a key feature in Wireless Sensor Networks but they are prone to many kinds of
attacks and one of them is Black Hole Attack. In a black hole attack all the packets are …

[PDF][PDF] An energy preserving detection mechanism for blackhole attack in wireless sensor networks

C Lal, A Shrivastava - International Journal of Computer Applications, 2015 - academia.edu
Wireless sensor networks (WSNs) are currently used in many application areas such as
military applications, control and tracking applications, habitat monitoring applications where …

Detection and isolation of black hole attack in wireless sensor network using hybrid techniques (Received packet and time delay)

A Kaur - 2016 International Conference on Inventive …, 2016 - ieeexplore.ieee.org
Wireless Sensor Network is a network consisting thousands of small nodes which provides
conviction communication for sensor (data), have ability to activate device that have only …

Detection of blackhole attack in wireless sensor network using enhanced check agent

R Saputra, J Andika, M Alaydrus - 2020 fifth international …, 2020 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is a heterogeneous type of network consisting of scattered
sensor nodes and working together for data collection, processing, and transmission …

Simulating and analysing security attacks in wireless sensor networks using QualNet

AH Moon, NA Shah, U Iqbal… - … Conference on Machine …, 2013 - ieeexplore.ieee.org
Wireless Sensor based network do not have a global view of network topology. The
communication pattern is many-to-one routed at base station. The routing is mostly based on …

TBESP algorithm for wireless sensor network under blackhole attack

M Wazid, A Katal, RH Goudar - 2013 International Conference …, 2013 - ieeexplore.ieee.org
Wireless Sensor Network consists of large number of sensor nodes with limited battery
power, which are randomly deployed over certain area for several applications. Wireless …

[PDF][PDF] Case study of a black hole attack on LoWPAN-RPL

K Chugh, L Aboubaker, J Loo - Proc. of the Sixth International …, 2012 - personales.upv.es
This paper throws light on shortcomings of the Contiki Operating system and ContikiRPL
routing protocol, which may lead to an easy injection of malicious activity similar to black …

Anomaly based detection of Black Hole Attack on leach protocol in WSN

V Bansal, KK Saluja - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Wireless sensor network is one of the developing ranges of research in present situation. A
Wireless sensor network comprises of geographically dispersed self-governing tiny sensor …

[PDF][PDF] Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks

RW Anwar, M Bakhtiari, A Zainal… - … Teknologi (Science & …, 2016 - eprints.utm.my
The widespread usage of Wireless sensor networks in various fields and application make it
vulnerable to variety of security threats and attacks. These security attacks occur when an …