IPTTA: Leveraging Token-based node IP assignment and verification for WSN

SS Vinayagam, V Parthasarathy - … International Conference on …, 2014 - ieeexplore.ieee.org
This paper is focusing on detection and prevention Sybil nodes in Wireless Sensor
Networks. Sybil is a fake-ID based malicious activity destroying the networks behavior. Here …

To detect and overcome sinkhole attack in mobile ad hoc network

V Tank, A Lathigara - Communications on Applied Electronics, 2015 - caeaccess.org
Mobile ad-hoc network abbreviated as MANET is most emerging and highly demanding
wireless network technology. Due to the property of self-deliberate, where all point of …

Energy Constraint-Based Trust Assurance Route Formation in Wireless Sensor Network

SS Vinayagam, V Parthasarathy - Asian Journal of Research in …, 2016 - indianjournals.com
Identity disruption due to the new attack in peer to peer communication termed as Sybil
attack. Sybil is a fake ID based malicious activity destroying the network behavior. Sybil …

[PDF][PDF] Performance Evaluation of Black Hole Attack and Prevention Using AODV on MANET

CSE HOD - 2015 - academia.edu
An Ad-hoc network is a part of a network that is use for as requirement. It'sa LAN ie built
spontaneously as devices connect. A wireless Ad-Hoc network is decentralized type of …

[PDF][PDF] INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY TLS: Improving Security for Ad-Hoc Networks using Three Level …

R Murugesan, M Vijayaraj - Citeseer
A group of large autonomous wireless nodes are connected and communicating in a P2P
method on a Heterogeneous environment without defined infrastructure is named Mobile Ad …