Detection of malicious node behaviour via I-watchdog protocol in mobile Ad Hoc network with DSDV routing scheme

N Lal, S Kumar, A Saxena, VK Chaurasiya - Procedia Computer Science, 2015 - Elsevier
Mobile ad hoc network, is nowadays becoming extremely famous in research vicinity. A
range of protocols and methodology is coming into account to resolve an assortment of …

[PDF][PDF] Study on denial of service against underwater acoustic networks.

Y Dong, H Dong, G Zhang - J. Commun., 2014 - jocm.us
UAN (Underwater Acoustic Networks) is bound to play more important roles. Thinking of the
serious environment UAN operates, safety and security must be guaranteed first. Among the …

Recognizing attacks in wireless sensor network in view of internet of things

DP Acharjya, NSS Ahmed - Internet of things: Novel advances and …, 2017 - Springer
Wireless sensor networks are wide spreading, dominating, and has a far-reaching range of
utilizations such as battlefield scrutiny, traffic scrutiny, forest fire detection, flood detection …

Secured WBANs for pervasive m-healthcare social networks

S Smys, AD Kumar - … on intelligent systems and control (ISCO), 2016 - ieeexplore.ieee.org
Due to numerous modern scientific developments and new perceptions, the research on
wireless body area networks (WBANs) and low power wireless communications, pervasive …

Mitigation of byzantine attack using enhanced cooperative bait detection and prevention scheme (ECBDPS)

R Sharma, J Grover - 2015 4th International Conference on …, 2015 - ieeexplore.ieee.org
With the expansion of portable innovation, the wireless communication is turning out to be
more prominent than any time in recent memor. This is because of innovative advances in …

[PDF][PDF] An efficient approach to detect DoS attacks in Wireless Ad Hoc sensor network

R Isaac Sajan, J Jasper - International Journal of Scientific Research …, 2020 - academia.edu
Wireless Sensor Network (WSN) comprises large number of sensor nodes, which is capable
of transmitting information to a shorter distance in low bandwidth with low power …

[图书][B] Security Issues for Wireless Sensor Networks

P Verma, A Dumka, A Bhardwaj, N Kaur, A Ashok… - 2022 - taylorfrancis.com
Wireless sensor networks have attracted high interest over last few decades in the wireless
and mobile computing research community. Applications of wireless sensor networks are …

[PDF][PDF] An analysis of various attacks in manet

M Udhayamoorthi, C Senthilkumar… - International Journal of …, 2014 - academia.edu
An Ad-hoc network is a self-organized network, without a central coordinator, and which
frequently changes its topology. According to the perspective of our paper, we try to connect …

A localised clustering scheme to detect attacks in wireless sensor network

PP Joby, P Sengottuvelan - International journal of …, 2015 - inderscienceonline.com
Wireless sensor networks (WSN) is an embryonic communication technique in the universe
to be engaged for precarious circumstances resembling battle arenas and viable …

A review paper on security in mobile adhoc network

A Mehta - 2015 - osf.io
Mobile Ad-hoc network (MANET) is a collection of self configuring, multi-hop wireless
network. Due to the mobility and dynamic nature of MANET, network is not secure. MANET is …