scholarly journals Research on Wormhole Attack Detection Algorithm in Space Information Networks

2016 ◽  
Vol 10 (5) ◽  
pp. 181-192
Author(s):  
Yu Geng ◽  
Zhang jie ◽  
Zhang Yongfang ◽  
Ye ning ◽  
Ren Kaiya
2014 ◽  
Vol 530-531 ◽  
pp. 705-708
Author(s):  
Yao Meng

This paper first engine starting defense from Intrusion Detection, Intrusion detection engine analyzes the hardware platform, the overall structure of the technology and the design of the overall structure of the plug, which on the whole structure from intrusion defense systems were designed; then described in detail improved DDOS attack detection algorithm design thesis, and the design of anomaly detection algorithms.


2017 ◽  
Vol 3 (2) ◽  
pp. 254-263 ◽  
Author(s):  
Chunlei Huo ◽  
Zhixin Zhou ◽  
Kun Ding ◽  
Chunhong Pan

2016 ◽  
Vol 21 (1) ◽  
pp. 17-28 ◽  
Author(s):  
Huan Ma ◽  
Hao Ding ◽  
Yang Yang ◽  
Zhenqiang Mi ◽  
James Yifei Yang ◽  
...  

2017 ◽  
Vol 11 (1) ◽  
pp. 35-51 ◽  
Author(s):  
Mukesh Kumar ◽  
Kamlesh Dutta

Wireless networks are used by everyone for their convenience for transferring packets from one node to another without having a static infrastructure. In WSN, there are some nodes which are light weight, small in size, having low computation overhead, and low cost known as sensor nodes. In literature, there exists many secure data aggregation protocols available but they are not sufficient to detect the malicious node. The authors require a better security mechanism or a technique to secure the network. Data aggregation is an essential paradigm in WSN. The idea is to combine data coming from different source nodes in order to achieve energy efficiency. In this paper, the authors proposed a protocol for worm hole attack detection during data aggregation in WSN. Main focus is on wormhole attack detection and its countermeasures.


2021 ◽  
Author(s):  
Sicheng Gong

This paper proposes a novel event-triggered attack detection mechanism for converter-based DC microgrid system. Under a distributive network framework, each node collects its neighbours' relative data to regulate its own output for local stabilization. Without power line current data, hardly can an agent directly identify the source of unexpected power flow, especially under an organized attack composed of voltage variations and corresponding deceptive messages. In order to recognize traitors who broadcast wrong data, target at system distortion and even splitting, an efficient attack detection and identification strategy is mandatory. After the attack detector is triggered, each relative agent refuses to trust any received data directly before authentication. Through proposed two-step verification by comparing theoretical estimated signals with received ones, both self sensors and neighbour nodes would be inspected, and the attacker was difficult to hide himself. Through simulation on SIMULINK/PLECS and hardware experiments on dSpace Platform, the effectiveness of proposed detection algorithm has been proved.


2013 ◽  
Vol 443 ◽  
pp. 440-445 ◽  
Author(s):  
Liang Yu Luan ◽  
Ying Fang Fu ◽  
Peng Xiao ◽  
Ling Xi Peng

In a wireless mesh network, the need for cooperation among wireless nodes to relay each others packets exposes the network to a wide range of security threats. A particularly devastating type of threats is the so-called wormhole attacks. In order to defense against the attack, a type of wormhole attack model and a watch nodes-based wormhole attack detection scheme were presented in this paper. The scheme that is based on the combination of a number of techniques, such as distributed voting, watch nodes based detection and identity-based cryptosystem. Qualitative analysis and simulation show that the wormhole attack detection scheme is more advantageous over the some of the previous schemes in terms of performance and cost.


Sign in / Sign up

Export Citation Format

Share Document