[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shaon, 2015 - Google Patents

A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks

Shaon, 2015

View PDF
Document ID
1888134107534349428
Author
Shaon M
Publication year

External Links

Snippet

This thesis proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). The aim of the proposed research is to develop a detection scheme that can detect wormhole attacks (In …
Continue reading at mspace.lib.umanitoba.ca (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures

Similar Documents

Publication Publication Date Title
Borkar et al. A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept
Osanaiye et al. Denial of service defence for resource availability in wireless sensor networks
Mehetre et al. Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust
Jamali et al. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system
Jamali et al. Defending against wormhole attack in MANET using an artificial immune system
Singh et al. Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks
Kibirige et al. A survey on detection of sinkhole attack in wireless sensor network
Abidoye et al. DDoS attacks in WSNs: detection and countermeasures
Fotohi et al. A self-adaptive intrusion detection system for securing UAV-to-UAV communications based on the human immune system in UAV networks
Chaudhary et al. A new intrusion detection system based on soft computing techniques using neuro-fuzzy classifier for packet dropping attack in manets
Behzad et al. An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks
Singh et al. A technique to detect wormhole attack in wireless sensor network using artificial neural network
Rodić et al. Privacy leakage of LoRaWAN smart parking occupancy sensors
Gunduz et al. A review of machine learning solutions to denial-of-services attacks in wireless sensor networks
Singh et al. An intelligent intrusion detection and prevention system for safeguard mobile adhoc networks against malicious nodes
Premkumar et al. Scalable and energy efficient cluster based anomaly detection against denial of service attacks in wireless sensor networks
Omar et al. A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things
Rameshkumar et al. Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN.
Keerthana et al. Detecting sinkhole attack in wireless sensor network using enhanced particle swarm optimization technique
Sultan et al. An Intrusion Detection Mechanism for MANETs Based on Deep Learning Artificial Neural Networks (ANNs)
Gupta et al. Wormhole attack detection techniques in ad-hoc network: A systematic review
Ramachandran et al. [Retracted] A Low‐Latency and High‐Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)
Jayabalan et al. Deep learning model-based detection of jamming attacks in low-power and lossy wireless networks
Naderi et al. A trust based routing protocol for mitigation of sinkhole attacks in wireless sensor networks
Verma et al. A survey on wormhole attack detection and prevention techniques in wireless sensor networks