Detecting wormhole and Byzantine attacks in mobile ad hoc networks
The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also introduced new security vulnerabilities. Since the wireless shared medium is comp...
| Main Author: | Alam, Mohammad Rafiqul |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
Curtin University
2011
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/1701 |
Similar Items
Topological comparison-based wormhole detection for MANET
by: Chan, King-Sun, et al.
Published: (2014)
by: Chan, King-Sun, et al.
Published: (2014)
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015)
by: Enshaei, Mehdi
Published: (2015)
Practical mobile ad hoc networks for large scale cattle monitoring
by: Wietrzyk, Bartosz
Published: (2008)
by: Wietrzyk, Bartosz
Published: (2008)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
by: Ejmaa, Ali Mohamed E.
Published: (2017)
by: Ejmaa, Ali Mohamed E.
Published: (2017)
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
by: Zarafshan, Faraneh
Published: (2015)
by: Zarafshan, Faraneh
Published: (2015)
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
by: Waheed, Bassam M.S.
Published: (2014)
by: Waheed, Bassam M.S.
Published: (2014)
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
by: Abdulwahhab, Mohanad Mazin
Published: (2019)
by: Abdulwahhab, Mohanad Mazin
Published: (2019)
Channel congestion control mechanisms for IEEE 802.11P/1609.4 in vehicular ad-hoc networks
by: Al-Zaghir, Akram Abdullah
Published: (2019)
by: Al-Zaghir, Akram Abdullah
Published: (2019)
Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems
by: Radenkovic, Milena, et al.
Published: (2016)
by: Radenkovic, Milena, et al.
Published: (2016)
Locating bluetooth devices through an android application by creating an ad hoc network
by: Pamboukas, Savvas
Published: (2014)
by: Pamboukas, Savvas
Published: (2014)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
Architecture and performance of multi-hop wireless ad-hoc routing protocol (MultiWARP)
by: Van Der Werf, Steven Martijn
Published: (2010)
by: Van Der Werf, Steven Martijn
Published: (2010)
Performance evaluation of manet in presence of black hole nodes
by: Dhahir, Saif Mahmood
Published: (2017)
by: Dhahir, Saif Mahmood
Published: (2017)
The role of wireless sensor networks (WSNs) in industrial oil and gas condition monitoring
by: Akhondi, Mohammad Reza, et al.
Published: (2010)
by: Akhondi, Mohammad Reza, et al.
Published: (2010)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Efficient location privacy-aware forwarding in opportunistic mobile networks
by: Zakhary, Sameh, et al.
Published: (2014)
by: Zakhary, Sameh, et al.
Published: (2014)
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
by: Natsheh, Essam Fathi
Published: (2006)
by: Natsheh, Essam Fathi
Published: (2006)
Increasing communication reliability in manufacturing environments
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Gaming experience on the mobiTop system: a collocated ad-hoc collaboration system
by: Teo, Rhun Ming, et al.
Published: (2016)
by: Teo, Rhun Ming, et al.
Published: (2016)
An adaptive energy efficient protocol in media access control
by: Abduljaleel, Uday, et al.
Published: (2009)
by: Abduljaleel, Uday, et al.
Published: (2009)
Iterative group-based and difference ranking method for online rating systems with spamming attacks
by: Fu, Quan-Yun, et al.
Published: (2021)
by: Fu, Quan-Yun, et al.
Published: (2021)
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
by: Gurusamy, Gobi
Published: (2006)
by: Gurusamy, Gobi
Published: (2006)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
An efficient network mobility management for a 6LoWPAN mobile network in hospital environments
by: Shahamabadi, Mohammadreza Sahebi
Published: (2017)
by: Shahamabadi, Mohammadreza Sahebi
Published: (2017)
Core based tree multicast (M-CBT) approach in supporting mobility
by: Singh, Jaipal, et al.
Published: (2004)
by: Singh, Jaipal, et al.
Published: (2004)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Performance analysis of dual diversity cognitive AD HOC routing protocol [D2CARP] for cognitive radio AD HOC network in term of scalability / Nur Farah Hanani Mohd Zaim
by: Mohd Zaim, Nur Farah Hanani
Published: (2019)
by: Mohd Zaim, Nur Farah Hanani
Published: (2019)
Efficient blind rendezvous schemes for cognitive radio ad-hoc networks
by: Al-Mqdashi, Abdulmajid Mohammed Ahmed
Published: (2018)
by: Al-Mqdashi, Abdulmajid Mohammed Ahmed
Published: (2018)
Cooperative Power Scheduling for a Network of MIMO Links
by: Dong, X., et al.
Published: (2010)
by: Dong, X., et al.
Published: (2010)
A reliable unicast routing protocol for mobile ad hoc network
by: Sargolzaey, Hadi
Published: (2013)
by: Sargolzaey, Hadi
Published: (2013)
Efficient, Authentication and Access control Implementation in Mobile Ad hoc Networks (MANET) as applied to Indoor Navigation Guidance System for Vision Impaired People
by: Rupasinghe, Prabath, et al.
Published: (2012)
by: Rupasinghe, Prabath, et al.
Published: (2012)
Distributed motion coordination for mobile wireless sensor networks using vision
by: Lee, Justin
Published: (2003)
by: Lee, Justin
Published: (2003)
Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments
by: Wietrzyk, Bartosz, et al.
Published: (2007)
by: Wietrzyk, Bartosz, et al.
Published: (2007)
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
by: Ali, Khalid Abdullahi
Published: (2017)
by: Ali, Khalid Abdullahi
Published: (2017)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
A simulation engine model analysis for reliable multicast protocol in ad hoc network
by: Alahdal, Tariq, et al.
Published: (2008)
by: Alahdal, Tariq, et al.
Published: (2008)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
Similar Items
-
Topological comparison-based wormhole detection for MANET
by: Chan, King-Sun, et al.
Published: (2014) -
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015) -
Practical mobile ad hoc networks for large scale cattle monitoring
by: Wietrzyk, Bartosz
Published: (2008) -
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018) -
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)