[PDF][PDF] DEVELOPING AN ANOMALY SOFTWARE AGENT COLLUSIVE PIRACY PREVENTION SCHEME IN MULTIHOP WIRELESS NETWORKS

BL Triveni, B Babu, CSE Student, L CIET - ijetcse.com
(WMSN) is also an important study in Wireless sensor networks. Due to its minimized
accessibility power in CMOS gadgets, it offers better transmission power. In some scenarios …

[PDF][PDF] ENHANCED DYNAMIC DISTORTION-RESISTANT & LEAKAGE DETECTION WITH COLLUSIVE PIRACY PREVENTION SCHEME IN MULTIHOP WIRELESS …

S Nirenjena, SP Kumar - ijetcse.com
Networks (WMSNs) has been encouraged by the accessibility of minimal effort and low
power CMOS gadgets. Nonetheless, the transmission of mass video information requires …

[PDF][PDF] Content Leakage Detection by Using Traffic Pattern for Trusted Content Delivery Networks

P Sudumbare - International Journal of Computer Science and …, 2014 - Citeseer
Multimedia streaming applications and services are becoming popular in recent a year,
that's why issue of trusted video delivery to prevent the undesirable content leakage become …

Traffic pattern-based content leakage detection for trusted content delivery networks

H Nishiyama, D Fomo, ZM Fadlullah… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Due to the increasing popularity of multimedia streaming applications and services in recent
years, the issue of trusted video delivery to prevent undesirable content-leakage has …

Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks

KF Ssu, CH Chou, LW Cheng - Computer Communications, 2007 - Elsevier
Recently, security issues in wireless sensor networks become more important. Many
mechanisms have been proposed for solving varying types of malicious attacks. However …

An approach to identify data leakage in secure communication

S Sodagudi, RR Kurra - Proceedings of 2nd International Conference on …, 2017 - Springer
In the field of wireless networks, Mobile Ad hoc Network (MANET) is one of the most unique
applications due to mobility and scalability. As it is vulnerable to malicious attackers with the …

Suppression attack against multicast protocol in low power and lossy networks: Analysis and defenses

C Pu, X Zhou - Sensors, 2018 - mdpi.com
With increasingly prevalent wireless sensors and devices, low power and lossy networks
(LLNs) play an essential role in the realization of ubiquitous computing and communication …

Cellular automata trust-based energy drainage attack detection and prevention in wireless sensor networks

J Shahid, Z Muhammad, Z Iqbal, AS Almadhor… - Computer …, 2022 - Elsevier
Abstract Wireless Sensor Networks (WSNs) connect many tiny, self-configured, and limited
power sensor nodes. The primary purposes of these nodes are to sense information from the …

Error prone transmission system to resist data loss in a wireless sensor network

S Kumar, CR Krishna… - International Journal of …, 2017 - search.proquest.com
Data losses in wireless sensor network (WSN) commonly occur due to diverse transmission
errors such as hardware or software limitations, channel congestion, network coverage …

[PDF][PDF] Jamming attacks prevention in wireless sensor networks using secure packet hiding method

GJ Lakshmi, S Babu, BL Rao, P Mohan… - International Journal of …, 2013 - academia.edu
The Wireless Networks are exposed to serious security threat called jamming. This
intentional interference with wireless transmissions can be used as a launch pad for …