Jun 24, 2022 · We propose three techniques to detect the CollusiveHijack attack, the Path Detection Technique (PDT), the Hop Detection Technique (HDT), and the ...
Abstract—In this paper, we show that Hybrid Routing and Prophet protocols in Opportunistic Mobile Networks (OMNs) are vulnerable.
In this paper, we show that Hybrid Routing and Prophet protocols in Opportunistic Mobile Networks (OMNs) are vulnerable to the CollusiveHijack attack.
We propose three techniques to detect the CollusiveHijack attack, the Path Detection Technique (PDT), the Hop Detection Technique (HDT), and the Early Hop ...
May 13, 2023 · Abstract—In this paper, we show that Hybrid Routing and Prophet protocols in Opportunistic Mobile Networks (OMNs) are vulnerable.
Three techniques to detect the CollusiveHijack attack are proposed, the Path Detection Technique (PDT), the Hop detection technique (HDT), and the Early Hop ...
Dec 27, 2023 · 2023 IEEE Transaction on Secure Computing For More Details::Contact::K.Manjunath - 09535866270 http://www.tmksinfotech.com and ...
The results show that PDT and HDT are able to detect CollusiveHijack attacks with 80.0% and 99.4% detection rates, respectively (when Eve hijacks more than 60 ...
Jan 28, 2024 · On Detecting Route Hijacking Attack in Opportunistic Mobile Networks https://xoomprojects.com/ IEEE PROJECTS 2024 TITLE LIST WhatsApp ...
A systematic literature review is conducted to survey the research articles that studied the impacts of four major security attacks.