Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method

USRK Dhamodharan… - The Scientific World …, 2015 - Wiley Online Library
Wireless sensor networks are highly indispensable for securing network protection. Highly
critical attacks of various kinds have been documented in wireless sensor network till now by …

[HTML][HTML] A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it

M Jamshidi, E Zangeneh, M Esnaashari… - Wireless Personal …, 2019 - Springer
Abstract Today, Wireless Sensor Networks are widely employed in various applications
including military, environment, medical and urban applications. Thus, security …

Security analysis for Sybil attack in sensor network using compare and match-position verification method

B Barani Sundaram, T Kedir, MK Mishra… - Mobile Computing and …, 2022 - Springer
Remote sensor networks are exceptionally simple to ensure organization security.
Particularly, basic assaults of different sorts are recorded in remote sensor networks by …

Analysis of machine learning data security in the internet of things (IoT) circumstance

B Barani Sundaram, A Pandey, AT Abiko… - Expert Clouds and …, 2022 - Springer
The current Internet of things (IoT) technologies will also have a profound economic,
industrial and social influence on society. Teh ability of nodes to participate in IoT networks …

Enhanced the Data Hiding in Geometrical image using stego-Crypto techniques with machine laerning

BB Sundaram, S Maurya, P Karthika… - 2021 6th International …, 2021 - ieeexplore.ieee.org
Steganography and Cryptography are two significant and well known procedures are
accustomed to encoding with covering up of information in the machine learning (ML) …

A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks

M Jamshidi, E Zangeneh, M Esnaashari… - Computers & Electrical …, 2017 - Elsevier
Sybil attack is a well-known attack against wireless sensor networks (WSNs) in which a
malicious node attempts to propagate multiple identities. This attack is able to affect routing …

Network security analysis for signal strength based packet filitering

BB Sundaram, P Rajkumar, MM Ananthi… - 2020 3rd …, 2020 - ieeexplore.ieee.org
Signal Strength based position check is all the more encouraging when contrasted with
other Sybil assault discovery methods since it is lightweight and doesn't need centralization …

[HTML][HTML] On the vulnerability of the mobile ad hoc network to transmission power controlled Sybil attack: Adopting the mobility-based clustering

A Vasudeva, M Sood - Journal of King Saud University-Computer and …, 2022 - Elsevier
The large-scale deployment of Mobile Ad hoc Networks (MANETs) requires dealing with the
issues like low throughput, end-to-end delay, and energy exhaustion. In order to resolve …

[PDF][PDF] Review on avoiding Sybil attack in VANET while operating in an urban environment

NC Velayudhan, A Anitha, M Madanan… - Journal of Theoretical …, 2019 - researchgate.net
ABSTRACT VANET security became a significant and active area within the research
community. Despite the different attacks on certain nodes of the VANET which have been …

[HTML][HTML] Fuzzy based collaborative verification system for Sybil attack detection in MANET

H Rajadurai, UD Gandhi - Wireless Personal Communications, 2020 - Springer
In mobile ad hoc network (MANET), the existing papers are two-level-hash technique
reduces false positives however it does not verify the location and RSS information of the …