Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access


    Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things

    Muhammad Ali Khan1, Rao Naveed Bin Rais2,*, Osman Khalid1

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 827-843, 2023, DOI:10.32604/cmc.2023.040756

    Abstract The Internet of Things (IoT) comprises numerous resource-constrained devices that generate large volumes of data. The inherent vulnerabilities in IoT infrastructure, such as easily spoofed IP and MAC addresses, pose significant security challenges. Traditional routing protocols designed for wired or wireless networks may not be suitable for IoT networks due to their limitations. Therefore, the Routing Protocol for Low-Power and Lossy Networks (RPL) is widely used in IoT systems. However, the built-in security mechanism of RPL is inadequate in defending against sophisticated routing attacks, including Sybil attacks. To address these issues, this paper proposes a… More >

  • Open Access


    An Adaptive BWO Algorithm with RSA for Anomaly Detection in VANETs

    Y. Sarada Devi*, M. Roopa

    Journal of Cyber Security, Vol.4, No.3, pp. 153-167, 2022, DOI:10.32604/jcs.2022.033436

    Abstract Vehicular ad hoc networks (VANETs) are designed in accordance with the ad hoc mobile networks (MANETs), i.e., impulsive formation of a wireless network for V2V (vehicle-to-vehicle) communication. Each vehicle is preserved as a node which remains as share of network. All the vehicle in the network is made to be under communication in a VANET because of which all the vehicles in the range can be made connected to a to a unit & a wide network can be established with a huge range. Healthier traffic management, vehicle-to-vehicle communication and provision of road information can… More >

  • Open Access


    TMTACS: Two-Tier Multi-Trust-Based Algorithm to Countermeasure the Sybil Attacks

    Meena Bharti1,*, Shaveta Rani2, Paramjeet Singh2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3497-3512, 2022, DOI:10.32604/cmc.2022.029072

    Abstract Mobile Ad hoc Networks (MANETs) have always been vulnerable to Sybil attacks in which users create fake nodes to trick the system into thinking they’re authentic. These fake nodes need to be detected and deactivated for security reasons, to avoid harming the data collected by various applications. The MANET is an emerging field that promotes trust management among devices. Transparency is becoming more essential in the communication process, which is why clear and honest communication strategies are needed. Trust Management allows for MANET devices with different security protocols to connect. If a device finds difficulty… More >

  • Open Access


    Trust Management-Based Service Recovery and Attack Prevention in MANET

    V. Nivedita1,*, N. Nandhagopal2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 771-786, 2021, DOI:10.32604/iasc.2021.017547

    Abstract The mobile ad-hoc network (MANET) output is critically impaired by the versatility and resource constraint of nodes. Node mobility affects connection reliability, and node resource constraints can lead to congestion, which makes the design of a routing MANET protocol with quality of service (QoS) very difficult. An adaptive clustering reputation model (ACRM) method is proposed to improve energy efficiency with a cluster-based framework. The proposed framework is employed to overcome the problems of data protection, privacy, and policy. The proposed ACRM-MRT approach that includes direct and indirect node trust computation is introduced along with the… More >

Displaying 1-10 on page 1 of 4. Per Page