2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS) 2019
DOI: 10.1109/macs48846.2019.9024821
|View full text |Cite
|
Sign up to set email alerts
|

Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(16 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…However, in sinkhole attack, a malicious user adds a sinkhole node that is an enticing and optimal route so that the network traffic goes forward. Shukla [111], Zahra et al [112] and Bostani et al [113] have formulated a wormhole threat model in the WSN or RPL network that can generate a terrible result, including network alteration, falsification or node manipulation. However, Napiah et al…”
Section: A Perception Layer Threatsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, in sinkhole attack, a malicious user adds a sinkhole node that is an enticing and optimal route so that the network traffic goes forward. Shukla [111], Zahra et al [112] and Bostani et al [113] have formulated a wormhole threat model in the WSN or RPL network that can generate a terrible result, including network alteration, falsification or node manipulation. However, Napiah et al…”
Section: A Perception Layer Threatsmentioning
confidence: 99%
“…[111], [112] , [113], [114] Wormhole/Sinkhole/ Rank Modify packet routes, flow speed, rank of the nodes.…”
Section: Processing Layer Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…Another solution which is currently an active area of research as well is machine learning. Developing security solutions using machine learning techniques [62] is a promising field for development of security techniques to prevent active and passive security attacks.…”
Section: Unique Solution To Prevent Active and Passive Attacksmentioning
confidence: 99%
“…However, no matter what the issues are, there have been solutions proposed by researchers and they continue to develop them according to the requirements. For example, in [58][59][60] authors have proposed detection of attacks in communication protocols used in internet of things networks, while in [61], RFID technology has been proposed to be used for secure attendance monitoring. In [62] authors have performed comprehensive analysis of privacy protection issues in cloud computing applications which can be used as a basis for development of secure solutions in the context of mobile cloud computing.…”
Section: Solution For Issues and Challengesmentioning
confidence: 99%