Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST
Abstract The Internet of Things (IoT) plays a vital role in many application domains like
battlefield surveillance, wildlife monitoring, disaster response, medical care, transportation …
battlefield surveillance, wildlife monitoring, disaster response, medical care, transportation …
An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN
Wireless sensor networks (WSN) were cataloged as one of the most important emerging
technologies of the last century and are considered the basis of the Internet of Things …
technologies of the last century and are considered the basis of the Internet of Things …
[PDF][PDF] Identifying and improving the malicious behavior of rushing and blackhole attacks using proposed IDSAODV protocol
PN Ranchhodbhai, K Tripathi - International Journal of Recent …, 2019 - academia.edu
Wireless Ad hoc Network is established by a collection of mobile nodes without any fixed
infrastructure, where each node plays a role of the router. There are not any centralize …
infrastructure, where each node plays a role of the router. There are not any centralize …
Link prediction for identifying link failure using cross layer approach
Mobile Adhoc networks have been a popular research topic in the last few years due to their
many applications in the civil and military fields. The standard IEEE 802.11 and ordinary …
many applications in the civil and military fields. The standard IEEE 802.11 and ordinary …
DOS attacks on WSN and their classifications with countermeasures-a survey
Abstract Wireless Sensor Networks (WSN) is a network of sensors, actuators, mobile and
wearable devices that have processing and communication modules to monitor physical …
wearable devices that have processing and communication modules to monitor physical …
[PDF][PDF] Detection Prevention Techniques of Sinkhole Attack in Mobile Adhoc Network: A Survey
NJ Patel - International Journal of Latest Research in Engineering …, 2016 - academia.edu
Sinkhole attack is one of severe kind of attack in wireless sensor network. Sinkhole attack
tries to attract network traffic toward them by advertising un-authorized routing updates and …
tries to attract network traffic toward them by advertising un-authorized routing updates and …
A Novel Next Hop Selection Algorithm for Multi-Hop Wireless Sensor Networks
HM Ali - i-Manager's Journal on Wireless Communication …, 2017 - search.proquest.com
In this paper, the author has proposed a new route next-hop selection algorithm for Wireless
Sensor Networks (WSNs) that is aimed towards reducing packet loss, end-to-end delay, and …
Sensor Networks (WSNs) that is aimed towards reducing packet loss, end-to-end delay, and …
Deteksi Sinkhole Attack pada MANET dengan Protokol Routing AODV Menggunakan Perbedaan Sequence Number
Pada MANET yang menngunakan protokol routing AODV, routing table akan di-update
setiap kali ada permintaan dari node dalam jaringan. Hal ini dapat menimbulkan masalah …
setiap kali ada permintaan dari node dalam jaringan. Hal ini dapat menimbulkan masalah …
[CITATION][C] Security analysis of routing protocols for wireless sensor networks
C John, C Wahi - International Journal of Applied Engineering Research, 2016
[CITATION][C] RESULT BASED APPROACH ON INTRUSION DETECTION SYSTEM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS
EK Bansal, ER Sharma