Jimma University Open access Institutional Repository

Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN

Show simple item record

dc.contributor.author Kamaleshwar, T.
dc.contributor.author Lakshminarayanan, R.
dc.contributor.author Teekaraman, Yuvaraja
dc.contributor.author Kuppusamy, Ramya
dc.contributor.author Radhakrishnan, Arun
dc.date.accessioned 2022-04-07T13:44:10Z
dc.date.available 2022-04-07T13:44:10Z
dc.date.issued 2021-12-26
dc.identifier.uri https://repository.ju.edu.et//handle/123456789/6962
dc.description.abstract Internet network communication protocol version 6 low-power wireless personal area networks (6LoWPAN) is supposed to assist the gadgets with low-power wireless sensor network (WSN) and it furnishes the top model layer of the data transmission system. The 6LoWPAN is prone to the diversified attacks such as wormhole and black hole attacks, which might be very difficult to become aware of and defend. In a wormhole attack, the attacker listens to the facts over the networks, and in a black hole attack, the intruder reprograms the nodes to dam the data transmission. As an end result, any data datagram that enters the attacked region will end result in transmission failure with low flow network rate and excessive one-way delay. To come across and heal the attack, a self-adaptive framework is brought into the networks and the procedure of data transmission is enriched. In this work, the affected region is measured and rectified with the aid of using the proposed self-adaptive framework for Ad Hoc On-Demand Distance Vector (AODV) routing protocol network communication protocol. The overall performance of the network healing technique is investigated with the aid of using simulation and its miles diagnosed that the proposed framework suggests promising overall performance with the aid of using accomplishing excessive flow network rate and minimum delay en_US
dc.language.iso en_US en_US
dc.title Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IR


Browse

My Account