An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN

Wireless sensor networks (WSN) were cataloged as one of the most important emerging technologies of the last century and are considered the basis of the Internet of Things paradigm. However, an undeniable disadvantage of WSN is that the resources available for these types of networks, such as processing capacity, memory, and battery, are usually in short supply. This limitation in resources implements security mechanisms a difficult task. This work reviews 93 recent proposals in which different solutions were formulated for the different attacks in WSN in the network layer; in total, 139 references were considered. According to the literature, these attacks are mainly Sybil, wormhole, sinkhole, and selective forwarding. The main goal of this contribution is to present the evaluation metrics used in the state of the art to mitigate the Sybil, wormhole, sinkhole, and selective forwarding attacks and show the network topologies used in each of these proposals.

[1]  SheQiang Peng,et al.  Security Technology Analysis of IOT , 2012 .

[2]  Yu Liu,et al.  eBPlatform: An IoT-based system for NCD patients homecare in China , 2014, 2014 IEEE Global Communications Conference.

[3]  Muhammad Khurram Khan,et al.  Design of sinkhole node detection mechanism for hierarchical wireless sensor networks , 2016, Secur. Commun. Networks.

[4]  Avijit Mathur,et al.  Medical WSN: Defense for selective forwarding attack , 2015, 2015 9th International Conference on Sensing Technology (ICST).

[5]  V. Loscri,et al.  A two-levels hierarchy for low-energy adaptive clustering hierarchy (TL-LEACH) , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[6]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[7]  Ashish D. Patel,et al.  A Trust Based Solution for Detection of Network Layer Attacks in Sensor Networks , 2016, 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE).

[8]  Chaitali Biswas Dutta,et al.  Intrusion Detection System for Power-Aware OLSR , 2015, 2015 International Conference on Computational Intelligence and Networks.

[9]  Anal Patel,et al.  Defending against Wormhole Attack in MANET , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[10]  Drago Zagar,et al.  System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks , 2016, J. Sensors.

[11]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[12]  A. Umamakeswari,et al.  InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[13]  A. Govardhan,et al.  Sybil attack detection technique using session key certificate in vehicular ad hoc networks , 2017, 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET).

[14]  Sandeep Kumar Gupta,et al.  Performance analysis of detection technique for select forwarding attack on WSN , 2016, 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC).

[15]  Antoine B. Bagula,et al.  Service-Aware Clustering: An Energy-Efficient Model for the Internet-of-Things , 2016, Sensors.

[16]  Wei Shi,et al.  A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network , 2015, KSII Trans. Internet Inf. Syst..

[17]  Abdul Hanan Abdullah,et al.  Enhanced trust aware routing against wormhole attacks in wireless sensor networks , 2015, 2015 International Conference on Smart Sensors and Application (ICSSA).

[18]  Manash Jyoti Deka,et al.  SEED: Secure and energy efficient data transmission in Wireless Sensor Networks , 2016, 2016 4th International Conference on Information and Communication Technology (ICoICT).

[19]  G. Reni,et al.  Active monitoring insole: A wearable device for monitoring foot load distribution in home-care context , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[20]  Jian Su,et al.  A Novel Multi-Hop Distance-Bounding Protocol Used in Wireless Sensor Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[21]  Shifei Ding,et al.  Mixed and Continuous Strategy Monitor-Forward Game Based Selective Forwarding Solution in WSN , 2015, Int. J. Distributed Sens. Networks.

[22]  Ahmed Bouridane,et al.  RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network , 2016, 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).

[23]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[24]  Upendra Singh,et al.  New approach through detection and prevention of wormhole attack in MANET , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[25]  S. Lavanya,et al.  Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission , 2016, Wirel. Pers. Commun..

[26]  Hui Wu,et al.  Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[27]  Sungho Choi,et al.  Selection of Shear Horizontal Wave Transducers for Robotic Nondestructive Inspection in Harsh Environments , 2017, Sensors.

[28]  Gresa Shala,et al.  Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks , 2018, Future Internet.

[29]  S. C. Mukhopadhyay,et al.  Advanced AODV approach for efficient detection and mitigation of wormhole attack in MANET , 2016, 2016 10th International Conference on Sensing Technology (ICST).

[30]  Yue Liu,et al.  The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities , 2014, IEEE Transactions on Mobile Computing.

[31]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[32]  Vikas Solanke,et al.  Wireless sensor network security threats , 2013, ARTCom 2013.

[33]  Ali A. Pouyan,et al.  Sybil attack detection using a low cost short group signature in VANET , 2015, 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).

[34]  Jeevaa Katiravan,et al.  A Two level Detection of Routing Layer Attacks in Hierarchical Wireless Sensor Networks using Learning based Energy Prediction , 2015, KSII Trans. Internet Inf. Syst..

[35]  Ashok Kumar Das,et al.  An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[36]  Yaser Jararweh,et al.  A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[37]  A. Manjeshwar,et al.  TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[38]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[39]  Sudipta Roy,et al.  A New Hybrid Algorithm to Eliminate Wormhole Attack in Wireless Mesh Networks , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).

[40]  Sangeeta Sharma,et al.  Detection & Prevention of Sybil attack in Ad hoc network using hybrid MAP & MAC technique , 2016, 2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC).

[41]  Priya Pathak,et al.  Movement based or neighbor based tehnique for preventing wormhole attack in MANET , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[42]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[43]  Gongxuan Zhang,et al.  A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks , 2016, Int. J. Distributed Sens. Networks.

[44]  Karim Faez,et al.  A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs , 2018, Future Internet.

[45]  Shashank Kapoor,et al.  Interactive intellegent shopping cart using RFID and ZIGBEE modules , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[46]  Elmer V. Bernstam,et al.  Social support in an Internet weight loss community , 2010, Int. J. Medical Informatics.

[47]  Mario Gerla,et al.  INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[48]  Sipra Das Bit,et al.  LoENA: Low-overhead encryption based node authentication in WSN , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[49]  Yezid Donoso,et al.  Energy Optimization in Mobile Wireless Sensor Networks with Mobile Targets Achieving Efficient Coverage for Critical Applications , 2013, Int. J. Comput. Commun. Control.

[50]  Jayashree Agarkhed,et al.  QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).

[51]  K. Nirmal Raja,et al.  Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack , 2017, Journal of Medical Systems.

[52]  P. Mohan Kumar,et al.  Security protocols in WSN: A survey , 2017, 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM).

[53]  Uma Rathore Bhatt,et al.  DDOS Attack Aware DSR Routing Protocol in WSN , 2016 .

[54]  Abdelhamid Mellouk,et al.  Secure Routing in Cluster-Based Wireless Sensor Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[55]  Ramesh Karri,et al.  Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.

[56]  Parma Nand,et al.  Secure message broadcasting in VANET over Wormhole attack by using cryptographic technique , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[57]  Brijendra Kumar Joshi,et al.  A mitigation technique for high transmission power based wormhole attack in Wireless Sensor Networks , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[58]  Meng Joo Er,et al.  Wireless Sensor Networks for Industrial Environments , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).

[59]  Daladier Jabba Molinares,et al.  Internet de las cosas y la salud centrada en el hogar , 2016 .

[60]  G. Padmavathi,et al.  Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique , 2016 .

[61]  Daladier Jabba,et al.  Sigma Routing Metric for RPL Protocol , 2018, Sensors.

[62]  K J Calfas,et al.  Design and implementation of a randomized controlled social and mobile weight loss trial for young adults (project SMART). , 2014, Contemporary clinical trials.

[63]  Andreas Pitsillides,et al.  WSN operability during persistent attack execution , 2016, 2016 23rd International Conference on Telecommunications (ICT).

[64]  Ranjeet Kaur,et al.  Isolation of Sybil attack in VANET using neighboring information , 2015, 2015 IEEE International Advance Computing Conference (IACC).

[65]  Sunho Lim,et al.  Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[66]  D. Vakula,et al.  Low cost smart parking system for smart cities , 2017, 2017 International Conference on Intelligent Sustainable Systems (ICISS).

[67]  Kumbesan Sandrasegaran,et al.  A location-based smart shopping system with IoT technology , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).

[68]  Thienne Johnson,et al.  Strong authentication countermeasures using dynamic keying for sinkhole and distance spoofing attacks in smart grid networks , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[69]  Katina Michael,et al.  Connected: To Everyone and Everything [Guest Editorial: Special Section on Sensors] , 2013, IEEE Technol. Soc. Mag..

[70]  Chungui Liu,et al.  Community Medical Network (CMN): Architecture and implementation , 2011, 2011 Global Mobile Congress.

[71]  Khaled M. Elleithy,et al.  Selective forwarding detection (SFD) in wireless sensor networks , 2015, 2015 Long Island Systems, Applications and Technology.

[72]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, TrustCom 2015.

[73]  Leila Ben Saad,et al.  An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[74]  Shikha Sharma,et al.  A defensive timestamp approach to detect and mitigate the Sybil attack in vanet , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

[75]  Jaime Lloret Mauri,et al.  QoS Based Cooperative Communications and Security Mechanisms for Ad Hoc Sensor Networks , 2017, J. Sensors.

[76]  R. K. Gnanamurthy,et al.  Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network , 2016, Wirel. Pers. Commun..

[77]  Mehmet A. Orgun,et al.  Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks , 2016, Sensors.

[78]  P. Deepa Shenoy,et al.  CMNTS: Catching malicious nodes with trust support in wireless sensor networks , 2016, 2016 IEEE Region 10 Symposium (TENSYMP).

[79]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[80]  Xiaohui Yuan,et al.  An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.

[81]  Kashif Saleem,et al.  Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink , 2015, 2015 12th International Conference on Information Technology - New Generations.

[82]  Pengfei Li,et al.  A sybil attack detection scheme for privacy-preserving mobile social networks , 2015, 2015 10th International Conference on Information, Communications and Signal Processing (ICICS).

[83]  Fan Wu,et al.  Challenges of wireless sensor networks for Internet of thing applications , 2016, Int. J. Distributed Sens. Networks.

[84]  Mehmet A. Orgun,et al.  Secure transfer of environmental data to enhance human decision accuracy , 2015, Comput. Hum. Behav..

[85]  Ashok Kumar Das,et al.  A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[86]  Michele Nogueira Lima,et al.  Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[87]  Li Yi,et al.  The Research of Security Threat and Corresponding Defense Strategy for WSN , 2015, 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation.

[88]  Mohammad S. Obaidat,et al.  Wormhole prevention using COTA mechanism in position based environment over MANETs , 2015, 2015 IEEE International Conference on Communications (ICC).

[89]  Zoe L. Jiang,et al.  Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[90]  Hai Zhou,et al.  A Security Mechanism for Cluster-Based WSN against Selective Forwarding , 2016, Sensors.

[91]  Mahalakshmi Gunasekaran,et al.  GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN , 2017, Secur. Commun. Networks.

[92]  Yu Jiang,et al.  Sensor attack detection using history based pairwise inconsistency , 2018, Future Gener. Comput. Syst..

[93]  Fazirulhisyam Hashim,et al.  Energy trust system for detecting sybil attack in clustered wireless sensor networks , 2015, 2015 IEEE 12th Malaysia International Conference on Communications (MICC).

[94]  Babangida Abubakar,et al.  Customary homes to smart homes using Internet of Things (IoT) and mobile application , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).

[95]  F. Beltrame Worldwide emergency telemedicine services: the R&D EU projects perspective , 1997, Information Technology Applications in Biomedicine. ITAB '97. Proceedings of the IEEE Engineering in Medicine and Biology Society Region 8 International Conference.

[96]  Avijit Mathur,et al.  Healthcare WSN: Cluster Elections and Selective Forwarding Defense , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[97]  David M. Eyers,et al.  Helping secure robots in WSN environments by monitoring WSN software updates for intrusions , 2015, 2015 6th International Conference on Automation, Robotics and Applications (ICARA).

[98]  Umamakeswari Arumugam,et al.  Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks , 2015, J. Sensors.

[99]  Joan Costa-i-Font,et al.  Social networking for medical information: A digital divide or a trust inquiry? , 2013 .

[100]  Venkatesh Kannan,et al.  A Resource Perspective to Wireless Sensor Network Security , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[101]  Puja Padiya,et al.  Detection and prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).

[102]  Chaodit Aswakul,et al.  SybilComm: Sybil community detection using persuading function in IoT system , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).

[103]  Mahmoud Naghshineh,et al.  Conserving transmission power in wireless ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[104]  Zhibo Pang,et al.  Intelligent packaging and intelligent medicine box for medication management towards the Internet-of-Things , 2014, 16th International Conference on Advanced Communication Technology.

[105]  Setiadi Yazid,et al.  Mitigation strategy of sinkhole attack in Wireless Sensor Network , 2017, 2017 International Workshop on Big Data and Information Security (IWBIS).

[106]  Zhao Ju,et al.  Analysis on Internet of Things (IOT) Based on the "Subway Supermarket" E-commerce Mode of TESCO , 2011, 2011 International Conference on Information Management, Innovation Management and Industrial Engineering.

[107]  Muhammad Yousaf,et al.  Neighbor Node Trust based Intrusion Detection System for WSN , 2015, EUSPN/ICTH.

[108]  Aduwati Sali,et al.  Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) , 2017, Comput. Commun..

[109]  Choong Seon Hong,et al.  Human Behavior Analysis by Means of Multimodal Context Mining , 2016, Sensors.

[110]  Roopesh Jenu,et al.  IoT middleware for smart city: (An integrated and centrally managed IoT middleware for smart city) , 2017, 2017 IEEE Region 10 Symposium (TENSYMP).

[111]  Leena Ragha,et al.  AODV based secure routing algorithm against Sinkhole attack in wirelesses Sensor Networks , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[112]  Daladier Jabba,et al.  Applications Based on Service-Oriented Architecture (SOA) in the Field of Home Healthcare , 2017, Sensors.

[113]  Swati Bhagat,et al.  A detection and prevention of wormhole attack in homogeneous Wireless sensor Network , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[114]  Lei Wang,et al.  Defense Technology of Wormhole Attacks Based on Node Connectivity , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).

[115]  J. Jithish,et al.  Sybil attack in IOT: Modelling and defenses , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[116]  D. Hailey,et al.  Systematic review of evidence for the benefits of telemedicine , 2002, Journal of telemedicine and telecare.

[117]  Manpreet Kaur,et al.  Detection and Mitigation of Sinkhole Attack in Wireless Sensor Network , 2016, 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE).

[118]  Samaneh Rashidibajgan A trust structure for detection of sybil attacks in opportunistic networks , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).

[119]  Sushil Kumar Saroj,et al.  Sybil attack prevention and detection in vehicular ad hoc network , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[120]  Yuan Zhang,et al.  Research on Improved DV-HOP Algorithm against Wormhole Attacks in WSN , 2016 .

[121]  Zhibo Pang,et al.  Technologies and Architectures of the Internet-of-Things (IoT) for Health and Well-being , 2013 .

[122]  Wei Dong,et al.  Robust and Secure Time-Synchronization Against Sybil Attacks for Sensor Networks , 2015, IEEE Transactions on Industrial Informatics.

[123]  Muhammad Bilal,et al.  An Authentication Protocol for Future Sensor Networks , 2017, Sensors.

[124]  Aníbal Ollero,et al.  Small UAS-Based Wind Feature Identification System Part 1: Integration and Validation , 2017, Sensors.

[125]  S. Renuga Devi,et al.  A low cost IoT based crowd management system for public transport , 2017, 2017 International Conference on Inventive Computing and Informatics (ICICI).

[126]  Avijit Mathur,et al.  Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT , 2016, Sensors.

[127]  Avijit Mathur,et al.  Medical WSN: Power, routing and selective forwarding defense , 2015, 2015 13th International Conference on Telecommunications (ConTEL).

[128]  Anastasios A. Economides,et al.  EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs , 2016, 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC).

[129]  Dong-Sun Kim,et al.  Moving Object Detection on a Vehicle Mounted Back-Up Camera , 2015, Sensors.

[130]  Wang Chao,et al.  The Security Routing Research for WSN in the Application of Intelligent Transport System , 2006, 2006 International Conference on Mechatronics and Automation.

[131]  Gisela Lanza,et al.  Development and Application of Eddy Current Sensor Arrays for Process Integrated Inspection of Carbon Fibre Preforms , 2017, Sensors.

[132]  Daladier Jabba,et al.  Objective Function BF-ETX for RPL Routing Protocol , 2018, IEEE Latin America Transactions.

[133]  I. Aas,et al.  Telemedicine and Changes in the Distribution of Tasks between Levels of Care , 2002, Journal of telemedicine and telecare.

[134]  Manish M. Patel,et al.  Security attacks in wireless sensor networks: A survey , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).

[135]  Shu-Yu Kuo,et al.  A Wormhole Attacks Detection Using a QTS Algorithm with MA in WSN , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.

[136]  Devesh Kumar,et al.  A mechanism of preventing sybil attack in MANET using bacterial foraging optimization , 2016, 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN).

[137]  Vanita Mane,et al.  Enhanced Vote Trust Algorithm for Sybil Detection , 2016, 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN).

[138]  Chaitali Biswas Dutta,et al.  Specification based IDS for camouflaging wormhole attack in OLSR , 2015, 2015 23rd Mediterranean Conference on Control and Automation (MED).

[139]  Paolo Bonato,et al.  Guest editorial: special section on smart wearable devices for human health and protection , 2010, IEEE Trans. Inf. Technol. Biomed..

[140]  Anita Kanavalli,et al.  STREE: A Secured Tree based Routing with Energy Efficiency in Wireless Sensor Network , 2015, 2015 International Conference on Computing and Communications Technologies (ICCCT).

[141]  Xue Liu,et al.  Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[142]  Thinagaran Perumal,et al.  IoT based activity recognition among smart home residents , 2017, 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE).

[143]  Meysam Alavi,et al.  A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks , 2016, 2016 Eighth International Conference on Information and Knowledge Technology (IKT).

[144]  Hao Jiang,et al.  A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks , 2015, 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP).

[145]  Muhammad Suryanegara,et al.  On developing the model of Smart Logistic Transport in Indonesia , 2016, 2016 IEEE International Conference on Management of Innovation and Technology (ICMIT).

[146]  Reena Nair,et al.  Region authority based collaborative scheme to detect Sybil attacks in VANET , 2015, 2015 International Conference on Control Communication & Computing India (ICCC).