Shaon, 2015 - Google Patents
A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networksShaon, 2015
View PDF- Document ID
- 1888134107534349428
- Author
- Shaon M
- Publication year
External Links
Snippet
This thesis proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). The aim of the proposed research is to develop a detection scheme that can detect wormhole attacks (In …
- 238000001514 detection method 0 title abstract description 182
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Borkar et al. | A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept | |
Osanaiye et al. | Denial of service defence for resource availability in wireless sensor networks | |
Mehetre et al. | Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust | |
Jamali et al. | DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system | |
Jamali et al. | Defending against wormhole attack in MANET using an artificial immune system | |
Singh et al. | Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks | |
Kibirige et al. | A survey on detection of sinkhole attack in wireless sensor network | |
Abidoye et al. | DDoS attacks in WSNs: detection and countermeasures | |
Fotohi et al. | A self-adaptive intrusion detection system for securing UAV-to-UAV communications based on the human immune system in UAV networks | |
Chaudhary et al. | A new intrusion detection system based on soft computing techniques using neuro-fuzzy classifier for packet dropping attack in manets | |
Behzad et al. | An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks | |
Singh et al. | A technique to detect wormhole attack in wireless sensor network using artificial neural network | |
Rodić et al. | Privacy leakage of LoRaWAN smart parking occupancy sensors | |
Gunduz et al. | A review of machine learning solutions to denial-of-services attacks in wireless sensor networks | |
Singh et al. | An intelligent intrusion detection and prevention system for safeguard mobile adhoc networks against malicious nodes | |
Premkumar et al. | Scalable and energy efficient cluster based anomaly detection against denial of service attacks in wireless sensor networks | |
Omar et al. | A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things | |
Rameshkumar et al. | Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN. | |
Keerthana et al. | Detecting sinkhole attack in wireless sensor network using enhanced particle swarm optimization technique | |
Sultan et al. | An Intrusion Detection Mechanism for MANETs Based on Deep Learning Artificial Neural Networks (ANNs) | |
Gupta et al. | Wormhole attack detection techniques in ad-hoc network: A systematic review | |
Ramachandran et al. | [Retracted] A Low‐Latency and High‐Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD) | |
Jayabalan et al. | Deep learning model-based detection of jamming attacks in low-power and lossy wireless networks | |
Naderi et al. | A trust based routing protocol for mitigation of sinkhole attacks in wireless sensor networks | |
Verma et al. | A survey on wormhole attack detection and prevention techniques in wireless sensor networks |