Sudhir Kumar Sharma’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Figure 1: Wormhole Attack.
Figure 3: Proposed Methodology
Fig 5: Packet loss Comparison
Throughput Analysis
Wormhole Attack Isolation Access from Mobile Ad hoc Network with Delay Prediction Method
  • Article
  • Full-text available

March 2020

·

12 Reads

·

2 Citations

International Journal of Recent Technology and Engineering (IJRTE)

·

Sudhir Kumar Sharma

The moveable ad hoc networks are untrustworthy and inclined to any intrusion due to their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are designed. The wormhole attack is considered to be the hazardous one among several attacks. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system observes the wormhole intrusions in the absence of intermediary sensor nodes towards the target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops remain amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered by these attacker nodes in the environment. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better results in comparison with existing approaches.

Download

Citations (1)


... The Area Under the Receiver Operating Characteristic (AUC-ROC) curve evaluates the trade-off between the actual positive rate (recall) and the false positive rate (FPR) across different classification thresholds [23]. A higher AUC score indicates better discrimination between attack and normal traffic instances [24]. ...

Reference:

Machine Learning-Based Detection of Wormhole Attacks in IoT Networks Using Classification Models
Wormhole Attack Isolation Access from Mobile Ad hoc Network with Delay Prediction Method

International Journal of Recent Technology and Engineering (IJRTE)