Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN)
Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes’ important credentials and subsequently replicate the nodes, which may expose the network to a number of other security...
| Main Authors: | Shaukat, Haafizah Rameeza, Hashim, Fazirulhisyam, Shaukat, Muhammad Arslan, Alezabi, Kamal Ali |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI
2020
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/38384/ http://psasir.upm.edu.my/id/eprint/38384/1/38384.pdf |
Similar Items
MWSN modeling using OMNeT++ simulator
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
Danger theory based node replication attacks detection in mobile wireless sensor network
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
Node replication attacks in mobile wireless sensor network: a survey
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
Energy efficiency mechanism using mobile-based fermat's spiral in wireless sensor networks
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Multi-hop wireless network modelling using OMNET++ simulator
by: Musaddiq, Arslan, et al.
Published: (2015)
by: Musaddiq, Arslan, et al.
Published: (2015)
Energy trust system for detecting sybil attack in clustered wireless sensor networks
by: Alsaedi, Noor, et al.
Published: (2015)
by: Alsaedi, Noor, et al.
Published: (2015)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
by: Alsaedi, Noor, et al.
Published: (2017)
by: Alsaedi, Noor, et al.
Published: (2017)
Detection and mitigation of ARP storm attacks using software defined networks
by: Numan, Munther, et al.
Published: (2017)
by: Numan, Munther, et al.
Published: (2017)
Normalized advancement based totally opportunistic routing algorithm with void detection and avoiding mechanism for underwater wireless sensor network
by: Rahman, Ziaur, et al.
Published: (2020)
by: Rahman, Ziaur, et al.
Published: (2020)
Survey of channel assignment algorithms for multi-radio multi-channel wireless mesh networks
by: Musaddiq, Arslan, et al.
Published: (2015)
by: Musaddiq, Arslan, et al.
Published: (2015)
Channel assignment and congestion control in multi-radio multi-channel wireless mesh networks
by: Musaddiq, Arslan
Published: (2015)
by: Musaddiq, Arslan
Published: (2015)
Distributed channel assignment based on congestion information in wireless mesh network
by: Musaddiq, Arslan, et al.
Published: (2014)
by: Musaddiq, Arslan, et al.
Published: (2014)
Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries
by: Rahmand, Pedram, et al.
Published: (2010)
by: Rahmand, Pedram, et al.
Published: (2010)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
by: Arshad, Akashah, et al.
Published: (2021)
by: Arshad, Akashah, et al.
Published: (2021)
Mitigating sulphate attacks in geotechnical engineering
by: Chegenizadeh, Amin, et al.
Published: (2017)
by: Chegenizadeh, Amin, et al.
Published: (2017)
Thermal and oxidative degradation of morpholine and blendof piperazine and diethanolamine for CO2 capture / Shaukat Ali
by: Ali, Shaukat
Published: (2016)
by: Ali, Shaukat
Published: (2016)
Strong Mobility Protocol For Mobile Wireless Sensor Networks
by: Muhammad, Javed
Published: (2015)
by: Muhammad, Javed
Published: (2015)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
A new sinkhole attack detection algorithm for RPL in wireless sensor networks (WSN)
by: Ali, Mohammed Qasim
Published: (2019)
by: Ali, Mohammed Qasim
Published: (2019)
Optimized-Hilbert for mobility in wireless sensor networks
by: Kamat, M., et al.
Published: (2007)
by: Kamat, M., et al.
Published: (2007)
Hybrid multi-objective evolutionary algorithms based on decomposition for wireless sensor network coverage optimization
by: Xu, Ying, et al.
Published: (2018)
by: Xu, Ying, et al.
Published: (2018)
Traveling distance estimation to mitigate unnecessary handoff in mobile wireless networks
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
Architecture as a celebration of multi-culturalism: revisiting Fatehpur Sikri
by: Mahmod, Shaukat, et al.
Published: (2014)
by: Mahmod, Shaukat, et al.
Published: (2014)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
Coverage degree in mobile nodes wireless sensor network
by: Awwad, Samer A. Bani, et al.
Published: (2008)
by: Awwad, Samer A. Bani, et al.
Published: (2008)
Mobile data gathering algorithms for wireless sensor networks
by: Ghaleb, Mukhtar Mahmoud Yahya
Published: (2014)
by: Ghaleb, Mukhtar Mahmoud Yahya
Published: (2014)
Secure-Rpl: Approach To Prevent Resource-Based Attacks In Wireless Sensor Networks Using Balanced Clustering
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
A Bio-Inspired Framework for Wireless Sensor Network Using Mobile Sensors
by: Ponnusamy , Vasaki, et al.
Published: (2010)
by: Ponnusamy , Vasaki, et al.
Published: (2010)
Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: a review paper
by: Qadori, Huthiafa Q., et al.
Published: (2017)
by: Qadori, Huthiafa Q., et al.
Published: (2017)
Mobility management schemes and mobility issues in low power wireless sensor network
by: Teo, Kar Hoey, et al.
Published: (2012)
by: Teo, Kar Hoey, et al.
Published: (2012)
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Data gathering with multi-attribute fusion in wireless sensor networks
by: Lin, Kai, et al.
Published: (2011)
by: Lin, Kai, et al.
Published: (2011)
Deploying clustered wireless sensor network by multi-robot system
by: Arezoumand, Reza, et al.
Published: (2014)
by: Arezoumand, Reza, et al.
Published: (2014)
A mobility management scheme for proxy mobile IPv6 wireless sensor networks
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
Similar Items
-
MWSN modeling using OMNeT++ simulator
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014) -
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014) -
Danger theory based node replication attacks detection in mobile wireless sensor network
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014) -
Node replication attacks in mobile wireless sensor network: a survey
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014) -
Energy efficiency mechanism using mobile-based fermat's spiral in wireless sensor networks
by: Mantoro, Teddy, et al.
Published: (2011)