wormhole attack
Recently Published Documents


TOTAL DOCUMENTS

342
(FIVE YEARS 84)

H-INDEX

15
(FIVE YEARS 2)

2021 ◽  
pp. 607-617
Author(s):  
Abhimanyu Sharma ◽  
Kiran Gautam ◽  
Sandeep Gurung ◽  
Rabindranath Bera
Keyword(s):  

2021 ◽  
Author(s):  
G. Amudha

Abstract In this study, to detect attacks of WSNs, a Hybrid Incursion Identification Approach (HIIA) is proposed. To reduce the amount of Energy Consumption (EC) of the sensor nodes, the HIIA mechanism utilizes a cluster-oriented approach with the LEACH protocol. For misuse observation and anomaly recognition, with MPNN (Multilayer Perceptron Neural Network) depended on fuzzy rule sets, HIIA structure is utilized. To refer to various varieties of attackers and to harmonize the identification results, with appendicle NN, FFNN (Feed Forward Neural Network) is utilized, that means Sybil Attack (SA), Hello Flood Attack (HFA) and Wormhole Attack (WA). To detect a SA, Improved SA Algorithm developed. Similarly, to detect a WA, that particular method is developed by Wormhole Anti-Hybrid Technique. Using the distance and power of the signal, HFA is detected. An exploratory research is conveyed out in a group of nodes. The nodes that misbehave in them are all determined. This proposed method, detects the performance of the accuracy, precision-recall and EC. This proposed method also finds the WA Detection Rate, HFA detection rate and the SA Detection Rate, respectively.


2021 ◽  
Author(s):  
Masoud Abdan ◽  
Seyed Amin Hosseini Seno

Abstract A wormhole attack is a type of attack on the network layer which reflects the issue of routing protocols. The classification is performed with several methods of machine learning consisting of K-Nearest Neighbor (KNN), Support Vector Machine (SVM), Decision Tree (DT), Linear Discrimination Analysis (LDA), Naive Bayes (NB), and Convolutional neural network (CNN). Moreover, for feature extraction, we used the properties of nodes, especially nodes speed in the MANET. We have collected 3997 distinct (normal 3781 and malicious 216) samples that comprise normal and malicious samples. Results of the classification show that the accuracy of KNN, SVM, DT, LDA, NB, and CNN methods are 97.1%, 98.2%, 98.9%, 95.2%, 94.7%, and 96.4%, respectively. Based on our findings, the DT method's accuracy is 98.9% and higher than other methods. In the next priority, SVM, KNN, CNN, LDA, and NB indicate high accuracy, respectively.


2021 ◽  
Vol 33 (2) ◽  
pp. 1-16
Author(s):  
Brij B. Gupta ◽  
Shaifali Narayan

This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of this method is authenticating the POS terminals by an authentication server to bind the generated token to a single POS machine. To secure the system from eavesdropping attack, the data transmitted between the user device and the machine is encrypted by using the Elgamal encryption method. The keys used in the method are dynamic in nature. Furthermore, comparison and security analysis are presented with previously proposed systems.


2021 ◽  
Author(s):  
John Clement Sunder A ◽  
K.P. Sampoornam KP ◽  
R.Vinodkumar R

Abstract Detection and isolation of Sybil and wormhole attack nodes in healthcare WSN is a significant problem to be resolved. Few research works have been designed to identify Sybil and wormhole attack nodes in the network. However, the detection performance of Sybil and wormhole attack nodes was not effectual as the false alarm rate was higher. In order to overcome such limitations, Delta Ruled First Order Iterative Deep Learning based Intrusion Detection (DRFOIDL-ID) Technique is proposed. The DRFOIDL-ID Technique includes two main phase namely attack detection and isolation. The DRFOIDL-ID Technique constructs Delta Ruled First Order Iterative Deep Learning in attack detection phase with aim of detecting the occurrence of Sybil and wormhole attacks in healthcare WSN. After detecting the attack nodes, DRFOIDL-ID Technique carried outs isolation process with the objective of increasing the routing performance. During the isolation phase, DRFOIDL-ID Technique keep always the identified Sybil and wormhole attack nodes through transmitting the isolation messages to all sensor nodes in healthcare WSN. Hence, DRFOIDL-ID Technique improves the routing performance with lower packet loss rate. The DRFOIDL-ID Technique conducts the simulation process using factors such as attack detection rate, attack detection time, false alarm rate and packet loss rate with respect to a diverse number of sensor nodes and data packets. The simulation result proves that the DRFOIDL-ID Technique is able to improve the attack detection rate and also reduces the attack detection time as compared to state-of-the-art works.


Sign in / Sign up

Export Citation Format

Share Document