Survey on sybil attack defense mechanisms in wireless ad hoc networks

A Vasudeva, M Sood - Journal of Network and Computer Applications, 2018 - Elsevier
Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the
wireless medium and an absence of central authority. In a Sybil attack, an adversary …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

Cyber security threat analysis and modeling of an unmanned aerial vehicle system

AY Javaid, W Sun, VK Devabhaktuni… - 2012 IEEE conference …, 2012 - ieeexplore.ieee.org
Advances in technology for miniature electronic military equipment and systems have led to
the emergence of unmanned aerial vehicles (UAVs) as the new weapons of war and tools …

Augmented and virtual reality based monitoring and safety system: A prototype IoT platform

MF Alam, S Katsikas, O Beltramello… - Journal of Network and …, 2017 - Elsevier
This paper presents an Augmented and Virtual Reality (AR/VR) based IoT prototype system.
Performing maintenance tasks in a complex environment is quite challenging and difficult …

Mechanism design-based secure leader election model for intrusion detection in MANET

N Mohammed, H Otrok, L Wang… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
In this paper, we study leader election in the presence of selfish nodes for intrusion detection
in mobile ad hoc networks (MANETs). To balance the resource consumption among all …

On the performance analysis of reset attack in cyber-physical systems

Y Ni, Z Guo, Y Mo, L Shi - IEEE Transactions on Automatic …, 2019 - ieeexplore.ieee.org
We investigate the impact of reset attacks in cyber-physical systems. Two types of attack
models, basic and advanced reset attacks, are considered in this paper. For the basic attack …

Efficient detection of Sybil attack based on cryptography in VANET

M Rahbari, MAJ Jamali - ar** attacks in wireless sensor networks with directional antennas
HN Dai, Q Wang, D Li… - International Journal of …, 2013 - journals.sagepub.com
The eavesdrop** attack is a serious security threat to a wireless sensor network (WSN)
since the eavesdrop** attack is a prerequisite for other attacks. Conventional WSNs …

Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA

JFC Joseph, BS Lee, A Das… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The uniqueness of security vulnerabilities in ad hoc networks has given rise to the need for
designing novel intrusion detection algorithms, different from those present in conventional …

[PDF][PDF] An enhanced distributed certificate authority scheme for authentication in mobile ad hoc networks

S Palaniswami, A Rajaram - The International Arab Journal of Information …, 2012 - ccis2k.org
In Mobile Ad hoc Networks (MANETs), it is easy to launch wormhole, man-in-the-middle and
Denial Of Service (DoS) attacks, or to impersonate another node. Our previous work …