A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology
نویسندگان
چکیده
منابع مشابه
Threshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملA Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the ...
متن کاملComparison of Different Methods to identify wormhole attacks in MANETS
Comparison of Different Methods to identify wormhole attacks in MANETS S.Seethalakshmi Asst.Professor, Thiagarajar School Of Management, Madurai 625005, India. [email protected] Dr. K. Chitra Manikandan Asst.Professor, Govt. Arts College, Melur, Madurai. [email protected] ----------------------------------------------------------------------ABSTRACT---------------------------------...
متن کاملCountermeasure for collusion attacks against digital watermarking
Customer identification watermarking today is one of the most promising application domains of digital watermarking. It enables to identify individual copies of otherwise indistinguishable digital copies. If done without any precautions, those individual watermarking are vulnerable to a number of specialized attacks based on an attacker collecting more than one individual copy. Fingerprinting a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Commerce Research
سال: 2013
ISSN: 1389-5753,1572-9362
DOI: 10.1007/s10660-013-9122-3