منابع مشابه
Defending against wormhole attacks in mobile ad hoc networks
In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbor relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. We propose a classification of the attacks according to the format of the wormholes. It establishes a basis on which the detection capability of the approaches can be ide...
متن کاملDefending Against Man-In-The-Middle Attack in Repeated Games
The Man-in-the-Middle (MITM) attack has become widespread in networks nowadays. The MITM attack would cause serious information leakage and result in tremendous loss to users. Previous work applies game theory to analyze the MITM attack-defense problem and computes the optimal defense strategy to minimize the total loss. It assumes that all defenders are cooperative and the attacker know defend...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملA Study on Black Hole Attack against Olsr Based Manets
Mobile ad hoc networks (MANETs) are a set of mobile nodes which over a shared wireless medium communicate with each other without the presence of a predefined infrastructure or a central authority. [1]. The absence of a central management agency or a fixed infrastructure is a key feature of MANETs. Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Geo-spatial Information Science
سال: 2006
ISSN: 1009-5020,1993-5153
DOI: 10.1007/bf02826773