An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN

K Ávila, P Sanmartin, D Jabba, J Gómez - Wireless Personal …, 2022 - Springer
Wireless sensor networks (WSN) were cataloged as one of the most important emerging
technologies of the last century and are considered the basis of the Internet of Things …

A survey on security in VANETs

T Pavithra, BS Nagabhushana - 2020 second international …, 2020 - ieeexplore.ieee.org
Vehicular Ad-hoc network (VANET) is a very promising and upcoming technologyusedfor
traffic management and for facilitating road safety along with entertainment system …

A novel secure DV-Hop localization algorithm against wormhole attacks

D Han, M Liu, TH Weng, C Tang, MD Marino… - Telecommunication …, 2022 - Springer
IoT era and its ubiquitous sensing raise serious security challenges such as wormhole
attacks. Given that these attacks may affect the location determination of the employed …

Trust system-and multiple verification technique-based method for detecting wormhole attacks in MANETs

J Ryu, S Kim - IEEE Access, 2024 - ieeexplore.ieee.org
The proliferation of wireless mobile devices has resulted in mobile ad hoc network (MANET)
technologies, which enable the formation of networks without infrastructure assistance …

[PDF][PDF] Multistage security detection in mobile ad-hoc network (MANET)

M Tahboush, M Agoyi, A Esaid - Int. J. Eng. Trends Technol, 2020 - researchgate.net
Mobile Ad-hoc Networks (MANET) is a selforganized, non-centralized network of mobile
nodes that communicate directly through intermediate nodes without infrastructure. MANET …

[PDF][PDF] Security aspects of MANETs: A review

Z Khan, A Sharma - International Journal of Computer Science and …, 2019 - academia.edu
The mobile ad hoc network is the type of network in which mobile nodes can join or leave
the network when they want. Due to self configuring nature of the network malicious nodes …

[PDF][PDF] A review on intrusion detection system

PB Singh, U Chugh, M Kathuria - Int. Res. J. Eng. Technol.(IRJET), 2019 - academia.edu
the vital and essential objective of intrusion detection is to supervise the network goods and
valuables to uncover anomalous behavior and exploitation in the network. Intrusion …

[PDF][PDF] Review of Wormhole Attack on Mobile Ad-hoc Network

M Badgujar, L Jat - Tech Scholar Deepak, and Lokendra Jat, 2022 - ijsret.com
WSNs are unstable because to the wireless nature of communication since any attacker with
the desire to steal the data may do so by inserting rogue nodes into the network. Attackers …

Analysis of Wormhole Attack Detection in Customized Ad Hoc Network

S Shrivastava, PK Johari - … of International Conference on Data Science …, 2023 - Springer
In contrast to wired networks, a wireless sensor network has widely dispersed nodes in an
unguided and unsupervised environment, making an attack by an adversary much more …

Security Threats and Possible Countermeasure In Digital Healthcare

O Fasunlade, S Zhou, D Sanders - … International Conference on …, 2021 - ieeexplore.ieee.org
With the rise of multifaceted devices and advancements in wireless communication, the
reputation of mobile ad hoc network (MANET) is growing with the rising number of …