A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST

K Prathapchandran, T Janani - Computer Networks, 2021‏ - Elsevier
Abstract The Internet of Things (IoT) plays a vital role in many application domains like
battlefield surveillance, wildlife monitoring, disaster response, medical care, transportation …

An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN

K Ávila, P Sanmartin, D Jabba, J Gómez - Wireless Personal …, 2022‏ - Springer
Wireless sensor networks (WSN) were cataloged as one of the most important emerging
technologies of the last century and are considered the basis of the Internet of Things …

[PDF][PDF] Identifying and improving the malicious behavior of rushing and blackhole attacks using proposed IDSAODV protocol

PN Ranchhodbhai, K Tripathi - International Journal of Recent …, 2019‏ - academia.edu
Wireless Ad hoc Network is established by a collection of mobile nodes without any fixed
infrastructure, where each node plays a role of the router. There are not any centralize …

Link prediction for identifying link failure using cross layer approach

VA Savalkar - 2018 2nd International Conference on Inventive …, 2018‏ - ieeexplore.ieee.org
Mobile Adhoc networks have been a popular research topic in the last few years due to their
many applications in the civil and military fields. The standard IEEE 802.11 and ordinary …

DOS attacks on WSN and their classifications with countermeasures-a survey

J Shahid, S Saleem, MN Qureshi - NUST Journal of …, 2016‏ - journals.nust.edu.pk
Abstract Wireless Sensor Networks (WSN) is a network of sensors, actuators, mobile and
wearable devices that have processing and communication modules to monitor physical …

[PDF][PDF] Detection Prevention Techniques of Sinkhole Attack in Mobile Adhoc Network: A Survey

NJ Patel - International Journal of Latest Research in Engineering …, 2016‏ - academia.edu
Sinkhole attack is one of severe kind of attack in wireless sensor network. Sinkhole attack
tries to attract network traffic toward them by advertising un-authorized routing updates and …

A Novel Next Hop Selection Algorithm for Multi-Hop Wireless Sensor Networks

HM Ali - i-Manager's Journal on Wireless Communication …, 2017‏ - search.proquest.com
In this paper, the author has proposed a new route next-hop selection algorithm for Wireless
Sensor Networks (WSNs) that is aimed towards reducing packet loss, end-to-end delay, and …

Deteksi Sinkhole Attack pada MANET dengan Protokol Routing AODV Menggunakan Perbedaan Sequence Number

MN Wicaksono, DP Kartikasari… - … Teknologi Informasi dan …, 2020‏ - j-ptiik.ub.ac.id
Pada MANET yang menngunakan protokol routing AODV, routing table akan di-update
setiap kali ada permintaan dari node dalam jaringan. Hal ini dapat menimbulkan masalah …

[CITATION][C] Security analysis of routing protocols for wireless sensor networks

C John, C Wahi - International Journal of Applied Engineering Research, 2016

[CITATION][C] RESULT BASED APPROACH ON INTRUSION DETECTION SYSTEM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS

EK Bansal, ER Sharma