[HTML][HTML] A cost-efficient software based router and traffic generator for simulation and testing of IP network

S Jun, K Przystupa, M Beshley, O Kochan, H Beshley… - Electronics, 2019 - mdpi.com
The development was carried out using the Qt5. 2 integrated development environment,
which uses the programming language C++. The main advantage of this environment is that …

Security DV‐hop localisation algorithm against wormhole attack in wireless sensor network

J Li, D Wang, Y Wang - IET Wireless Sensor Systems, 2018 - Wiley Online Library
Distance vector‐hop (DV‐hop) is a localisation algorithm based on distance vector routing,
which often suffers the wormhole attack. To solve this problem, a security DV‐hop …

Analysis of detection features for wormhole attacks in MANETs

M Imran, FA Khan, T Jamal, MH Durad - Procedia Computer Science, 2015 - Elsevier
Abstract Mobile Ad hoc Networks (MANETs) work without any fixed infrastructure and each
node in the network behaves as a router in order to transmit data towards the destination …

Advanced AODV approach for efficient detection and mitigation of wormhole attack in MANET

H Ghayvat, S Pandya, S Shah… - 2016 10th …, 2016 - ieeexplore.ieee.org
Wireless Communication is an inevitable part of Smart Home domain. A Mobile Ad-Hoc
Network (MANET) is defined as an arrangement of wireless mobile nodes which creates a …

[PDF][PDF] The security DV-hop algorithm against multiple-wormhole-node-link in WSN

J Li, D Wang - KSII Transactions on Internet and Information …, 2019 - koreascience.kr
Abstract Distance Vector-Hop (DV-Hop) algorithm is widely used in node localization. It often
suffers the wormhole attack. The current researches focus on Double-Wormhole-Node-Link …

[PDF][PDF] Distributed wormhole attack mitigation technique in WSNs

S Kori, GN Krishnamurthy, N Sidnal - Int. J. Comput. Netw. Inf …, 2019 - academia.edu
Sensing element Networks area unit gaining a lot of attention as a result of applications like
sensible cities (traffic congestion, sensible parking, sensible lighting), sensible setting (forest …

Analysis and prevention of wormhole attack using trust and reputation management scheme in MANET

S Parbin, L Mahor - … on Applied and Theoretical Computing and …, 2016 - ieeexplore.ieee.org
MANETs operates without fixed framework and all nodes in network perform like a router in
sequence to forward information next receiver. Since the pivotal point rein lack, MANETs are …

RTT Centered Automatic and Dynamic Wormhole Attack Discovery in Sensor Network

S Kori, GN Krishnamurthy… - … Conference on Electrical …, 2018 - ieeexplore.ieee.org
Sensor systems are acquiring more fame because of their wide range of applications like
process automation, environment (habitat) monitoring, seismic monitoring, and battlefield …

The impact of disabling suspicious node communications on network lifetime in wireless ad hoc sensor networks

Z Pala, N Inanc - Turkish Journal of Electrical Engineering …, 2016 - journals.tubitak.gov.tr
In wireless sensor networks (WSNs), the data observed by different nodes must be relayed
safely to the base station over intermediate nodes. In the network environment, some sensor …

[PDF][PDF] School of Computing Detection of Gray Hole and Wormhole Cooperative Attacks in MANET

O Fasunlade - researchportal.port.ac.uk
Mobile ad-hoc networks are self-configuring and self-organizing networks connected by
wireless links which create a random topology of mobile nodes. The topology of these …