Survey on sybil attack defense mechanisms in wireless ad hoc networks
A Vasudeva, M Sood - Journal of Network and Computer Applications, 2018 - Elsevier
Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the
wireless medium and an absence of central authority. In a Sybil attack, an adversary …
wireless medium and an absence of central authority. In a Sybil attack, an adversary …
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …
among researchers in the development of theoretical and practical concepts, and their …
Cyber security threat analysis and modeling of an unmanned aerial vehicle system
Advances in technology for miniature electronic military equipment and systems have led to
the emergence of unmanned aerial vehicles (UAVs) as the new weapons of war and tools …
the emergence of unmanned aerial vehicles (UAVs) as the new weapons of war and tools …
Augmented and virtual reality based monitoring and safety system: A prototype IoT platform
MF Alam, S Katsikas, O Beltramello… - Journal of Network and …, 2017 - Elsevier
This paper presents an Augmented and Virtual Reality (AR/VR) based IoT prototype system.
Performing maintenance tasks in a complex environment is quite challenging and difficult …
Performing maintenance tasks in a complex environment is quite challenging and difficult …
Mechanism design-based secure leader election model for intrusion detection in MANET
In this paper, we study leader election in the presence of selfish nodes for intrusion detection
in mobile ad hoc networks (MANETs). To balance the resource consumption among all …
in mobile ad hoc networks (MANETs). To balance the resource consumption among all …
On the performance analysis of reset attack in cyber-physical systems
We investigate the impact of reset attacks in cyber-physical systems. Two types of attack
models, basic and advanced reset attacks, are considered in this paper. For the basic attack …
models, basic and advanced reset attacks, are considered in this paper. For the basic attack …
Efficient detection of Sybil attack based on cryptography in VANET
M Rahbari, MAJ Jamali - ar** attacks in wireless sensor networks with directional antennas
The eavesdrop** attack is a serious security threat to a wireless sensor network (WSN)
since the eavesdrop** attack is a prerequisite for other attacks. Conventional WSNs …
since the eavesdrop** attack is a prerequisite for other attacks. Conventional WSNs …
Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA
JFC Joseph, BS Lee, A Das… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The uniqueness of security vulnerabilities in ad hoc networks has given rise to the need for
designing novel intrusion detection algorithms, different from those present in conventional …
designing novel intrusion detection algorithms, different from those present in conventional …
[PDF][PDF] An enhanced distributed certificate authority scheme for authentication in mobile ad hoc networks
S Palaniswami, A Rajaram - The International Arab Journal of Information …, 2012 - ccis2k.org
In Mobile Ad hoc Networks (MANETs), it is easy to launch wormhole, man-in-the-middle and
Denial Of Service (DoS) attacks, or to impersonate another node. Our previous work …
Denial Of Service (DoS) attacks, or to impersonate another node. Our previous work …