On the Robustness of Root Locus based Routing Attack-Detection in Reconfigurable Wireless Networks

Author(s):  
Jaime Zuniga-Mejia ◽  
Rafaela Villalpando-Hernandez ◽  
Cesar Vargas-Rosales
2019 ◽  
Vol 32 (15) ◽  
pp. e4024 ◽  
Author(s):  
Mohammad Wazid ◽  
Poonam Reshma Dsouza ◽  
Ashok Kumar Das ◽  
Vivekananda Bhat K ◽  
Neeraj Kumar ◽  
...  

2010 ◽  
Vol 54 (7) ◽  
pp. 1126-1141 ◽  
Author(s):  
John Felix Charles Joseph ◽  
Amitabha Das ◽  
Bu-Sung Lee ◽  
Boon-Chong Seet

2010 ◽  
Vol 10 (1) ◽  
pp. 32-46 ◽  
Author(s):  
Aidong Lu ◽  
Weichao Wang ◽  
Abhishek Dnyate ◽  
Xianlin Hu

We present a robust intrusion detection approach for wireless networks based on a new multi-matrix visualization method with a set of pattern generation, evaluation, organization and interaction functions. Our approach concentrates on assisting users to analyze statistical network topology patterns that could expose significant attack features. Specifically, we investigate Sybil attacks that have severe impacts on the fundamental operations of wireless networks. We have analyzed the features of network topologies under various Sybil attacks and, consequently, designed several matrix reordering algorithms to generate statistical patterns. These topology patterns are automatically evaluated and classified through the measured structural similarities to the signature attack patterns. We have also designed a new time-series analysis method to identify attack durations with a time histogram generation and an automatic segmentation method. To handle complex Sybil attacks, we have integrated our pattern generation, evaluation and organization methods to construct a prototype detection system, in which specialized interaction functions are provided to assist the analysis and comparison of network data. Simulation results show that this approach can effectively locate Sybil attacks under different combinations of network parameters. Our multi-matrix visualization method provides a flexible framework to handle the intricacies and implications from building a complex visual analytics system, which can be extended to defend against a wide range of attacks.


2020 ◽  
pp. 1332-1349
Author(s):  
Mukesh Kumar ◽  
Kamlesh Dutta

Wireless networks are used by everyone for their convenience for transferring packets from one node to another without having a static infrastructure. In WSN, there are some nodes which are light weight, small in size, having low computation overhead, and low cost known as sensor nodes. In literature, there exists many secure data aggregation protocols available but they are not sufficient to detect the malicious node. The authors require a better security mechanism or a technique to secure the network. Data aggregation is an essential paradigm in WSN. The idea is to combine data coming from different source nodes in order to achieve energy efficiency. In this paper, the authors proposed a protocol for worm hole attack detection during data aggregation in WSN. Main focus is on wormhole attack detection and its countermeasures.


Sign in / Sign up

Export Citation Format

Share Document