Comprehensive review on misbehavior detection for vehicular ad hoc networks

X Xu, Y Wang, P Wang - Journal of Advanced Transportation, 2022 - Wiley Online Library
Vehicular ad hoc networks (VANETs) can increase road safety and comfort. It needs strong
demand for security because the data sent in VANETs influence vehicles' behavior. Existing …

Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm

H Asgharzadeh, A Ghaffari, M Masdari… - Journal of Parallel and …, 2023 - Elsevier
Nowadays, the growth and pervasiveness of Internet of Things (IoT) devices have led to
increased attacks by hackers and attackers. On the other hand, using IoT infrastructure in …

Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks

X Cao, DM Shila, Y Cheng, Z Yang… - IEEE Internet of …, 2016 - ieeexplore.ieee.org
ZigBee has been widely recognized as an important enabling technique for Internet of
Things (IoT). However, the ZigBee nodes are normally resource-limited, making the network …

Defending ON–OFF attacks using light probing messages in smart sensors for industrial communication systems

X Liu, Y Liu, A Liu, LT Yang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Industrial communication systems (ICSs) have become an important part of many automated
applications. Smart sensors for ICSs have attracted much attention. Using smart sensors for …

Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks

J Ren, Y Zhang, K Zhang, X Shen - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are vulnerable to selective forwarding attacks that can
maliciously drop a subset of forwarding packets to degrade network performance and …

Energy depletion attacks in low power wireless networks

VL Nguyen, PC Lin, RH Hwang - IEEE Access, 2019 - ieeexplore.ieee.org
Low Power Wireless (LPW) networks have recently been emerging as key candidates to
offer affordable connectivity for the constrained devices in the Internet of Things (IoT) …

A novel approach for mitigating gray hole attack in MANET

S Gurung, S Chauhan - Wireless Networks, 2018 - Springer
Mobile ad hoc network (MANET) is defined as the category of wireless network that is
capable of operating without any fixed infrastructure. The main assumption considered in …

Trust management for defending on-off attacks

Y Chae, LC DiPippo, YL Sun - IEEE Transactions on Parallel …, 2014 - ieeexplore.ieee.org
A trust management scheme can be used to aid an automated decision-making process for
an access control policy. Since unintentional temporary errors are possible, the trust …

Wireless Sensor Network attacks: An overview and critical analysis

A Tayebi, S Berber, A Swain - 2013 Seventh international …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) are gaining a lot of attention from researchers due to their
massive applications. Network security is one of the important requirements of those …

A reputation‐based RPL protocol to detect selective forwarding attack in Internet of Things

A Patel, D Jinwala - International Journal of Communication …, 2022 - Wiley Online Library
Summary Internet of Things (IoT) is an internet of smart objects where smart objects
communicate with each other. IoT objects are deployed in open medium with dynamic …