Topological comparison-based wormhole detection for MANET
Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks. In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depend...
| Main Authors: | Chan, King-Sun, Alam, Mohammad |
|---|---|
| Format: | Journal Article |
| Published: |
John Wiley & Sons
2014
|
| Subjects: | |
| Online Access: | http://onlinelibrary.wiley.com/doi/10.1002/dac.2397/epdf http://hdl.handle.net/20.500.11937/15532 |
Similar Items
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments
by: Zakhary, Sameh R., et al.
Published: (2010)
by: Zakhary, Sameh R., et al.
Published: (2010)
Iterative group-based and difference ranking method for online rating systems with spamming attacks
by: Fu, Quan-Yun, et al.
Published: (2021)
by: Fu, Quan-Yun, et al.
Published: (2021)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Stability and Control Assessment of an Aerial Target Drone Based on a Scale Model of A-4 Skyhawk Jet Fighter
by: Bakar, Abu Zaid
Published: (2009)
by: Bakar, Abu Zaid
Published: (2009)
Strategic communications and the challenges of the post 9/11 world / Philip M. Taylor
by: Taylor, Philip M.
Published: (2008)
by: Taylor, Philip M.
Published: (2008)
Design and implementation of a web-based replacement for the manual system of moderating exams
by: Oladokun, Adeola Asiat
Published: (2014)
by: Oladokun, Adeola Asiat
Published: (2014)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Sulphate resistance of slag blended fly ash based geopolymer concrete
by: Deb, Partha, et al.
Published: (2013)
by: Deb, Partha, et al.
Published: (2013)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2016)
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2016)
Negativity and information in campaign advertising
by: Sullivan, Jonathan
Published: (2010)
by: Sullivan, Jonathan
Published: (2010)
Incidence and impact of dog attacks on guide dogs in the UK: an update
by: Moxon, Rachel, et al.
Published: (2016)
by: Moxon, Rachel, et al.
Published: (2016)
Characterisation of class F fly ash geopolymer pastes immersed in acid and alkaline solutions
by: Temuujin, Jadambaa, et al.
Published: (2011)
by: Temuujin, Jadambaa, et al.
Published: (2011)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
The media and information environments ten years after 9/11 / Gary D. Rawnsley
by: Rawnsley, Gary D.
Published: (2011)
by: Rawnsley, Gary D.
Published: (2011)
Efficient, Authentication and Access control Implementation in Mobile Ad hoc Networks (MANET) as applied to Indoor Navigation Guidance System for Vision Impaired People
by: Rupasinghe, Prabath, et al.
Published: (2012)
by: Rupasinghe, Prabath, et al.
Published: (2012)
Some Topics in Topological Data Analysis
by: Di, Yang
Published: (2021)
by: Di, Yang
Published: (2021)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Name-signature lookup system: a security enhancement to named data networking
by: Song, Zhicheng, et al.
Published: (2021)
by: Song, Zhicheng, et al.
Published: (2021)
A review on wormhole attacks in MANET
by: Enshaei, Mehdi, et al.
Published: (2015)
by: Enshaei, Mehdi, et al.
Published: (2015)
The 9/11 decade media discourse: content analysis on correspondents’ reports in Al Jazeera online / Noratikah Mohamad Ashari and Mokhtar Mohammad
by: Mohamad Ashari, Noratikah, et al.
Published: (2014)
by: Mohamad Ashari, Noratikah, et al.
Published: (2014)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
Remote assessment of platelet function in patients with acute stroke or transient ischaemic attack
by: Bath, Philip M.W., et al.
Published: (2017)
by: Bath, Philip M.W., et al.
Published: (2017)
Safety and efficacy of intensive vs. guideline antiplatelet therapy in high-risk patients with recent ischemic stroke or transient ischemic attack: rationale and design of the Triple Antiplatelets for Reducing Dependency after Ischaemic Stroke (TARDIS) trial (ISRCTN47823388)
by: Beridze, M., et al.
Published: (2015)
by: Beridze, M., et al.
Published: (2015)
Fractal cracking patterns in concretes exposed to sulfate attack
by: Yao, J., et al.
Published: (2019)
by: Yao, J., et al.
Published: (2019)
Generalizations of ѵ-Lindelöf generalized topological spaces
by: Abuage, Mariam M.
Published: (2018)
by: Abuage, Mariam M.
Published: (2018)
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
"Helping you to pay us": rapport management in debt collection call centre encounters
by: Harrington, Leigh
Published: (2018)
by: Harrington, Leigh
Published: (2018)
Polemics and persecution: East Romans and Paulicians c.780-880)
by: Dixon, Carl Stephen
Published: (2018)
by: Dixon, Carl Stephen
Published: (2018)
Combinatorial Optimization of Topological Design in Computer Communication Network
by: Garba Mohammed, Salisu
Published: (2004)
by: Garba Mohammed, Salisu
Published: (2004)
Analyzing factors influencing customer satisfaction on purchased cybersecurity solutions within B2B organizations in Malaysia
by: Subramaniam, Nageswar Rao
Published: (2024)
by: Subramaniam, Nageswar Rao
Published: (2024)
A system level comparison of drive topologies for high speed electrical machines
by: Savi, Filippo, et al.
Published: (2017)
by: Savi, Filippo, et al.
Published: (2017)
The study of glass from the eastern Mediterranean, south Caucasus and east Africa in the late 8th–14th centuries AD: an interdisciplinary approach
by: Siu, Ieong
Published: (2017)
by: Siu, Ieong
Published: (2017)
An international comparison of surface texture parameters quantification on polymer artefacts using optical instruments
by: Tosello, G., et al.
Published: (2016)
by: Tosello, G., et al.
Published: (2016)
Topology Optimization of Beam Structures with Various End andLoading Conditions
by: Woldemichael, Dereje, et al.
Published: (2014)
by: Woldemichael, Dereje, et al.
Published: (2014)
Baseline characteristics of the 3,096 patients recruited into the 'Triple Antiplatelets for Reducing Dependency after Ischaemic Stroke' (TARDIS) trial
by: Bath, Philip M.W., et al.
Published: (2017)
by: Bath, Philip M.W., et al.
Published: (2017)
Effects of Aggressive Ammonium Nitrate on Durability Properties of Concrete using Sandstone and Granite Aggregates
by: Wong, L., et al.
Published: (2013)
by: Wong, L., et al.
Published: (2013)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
September the 11th 2001 and security dilemma.
by: Soltani, Fakhreddin, et al.
Published: (2010)
by: Soltani, Fakhreddin, et al.
Published: (2010)
Similar Items
-
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011) -
Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments
by: Zakhary, Sameh R., et al.
Published: (2010) -
Iterative group-based and difference ranking method for online rating systems with spamming attacks
by: Fu, Quan-Yun, et al.
Published: (2021) -
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006) -
Stability and Control Assessment of an Aerial Target Drone Based on a Scale Model of A-4 Skyhawk Jet Fighter
by: Bakar, Abu Zaid
Published: (2009)