2020
DOI: 10.3233/jifs-182881
|View full text |Cite
|
Sign up to set email alerts
|

Detection and prevention of spoofing attacks in mobile adhoc networks using hybrid optimization algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…With this, the authors claimed that the suggested prototype is not merely efficacious against IP spoofing attacks, but it has also the capability to oppose the anticipation of malicious nodes in the network. Likewise, Visalakshi et al [86] proposed an improved whale optimization (IWO) algorithm for WSN applications to tackle the IP spoofing attacks related issues. In this prototype, the authors basically used IDS, where they defined parameters for transmitted signal evaluation to ensure the legitimacy of the network traffic followed by connected devices.…”
Section: B Network Layer Counteraction Schemes Of Swsnmentioning
confidence: 99%
“…With this, the authors claimed that the suggested prototype is not merely efficacious against IP spoofing attacks, but it has also the capability to oppose the anticipation of malicious nodes in the network. Likewise, Visalakshi et al [86] proposed an improved whale optimization (IWO) algorithm for WSN applications to tackle the IP spoofing attacks related issues. In this prototype, the authors basically used IDS, where they defined parameters for transmitted signal evaluation to ensure the legitimacy of the network traffic followed by connected devices.…”
Section: B Network Layer Counteraction Schemes Of Swsnmentioning
confidence: 99%
“…Moreover, misuse detection is better than abnormal behavior‐based detection 12 . IDS is executed through a condition check algorithm, which does the average route trust and evaluates the intrusion reaction action (IRA) from the nodes through no punishment, route change, and route isolate parameters of nodes 13 . IDS works with significant data collection from WSN nodes and detects aberrant sensor node behavior(s) 14 .…”
Section: Related Workmentioning
confidence: 99%
“…12 IDS is executed through a condition check algorithm, which does the average route trust and evaluates the intrusion reaction action (IRA) from the nodes through no punishment, route change, and route isolate parameters of nodes. 13 IDS works with significant data collection from WSN nodes and detects aberrant sensor node behavior(s). 14 Moreover, WSN attacks are similar and occur mainly in data link, application, and network layers.…”
Section: Related Workmentioning
confidence: 99%