Detecting Packet Dropping Attack in Wireless Ad Hoc Network
نویسندگان
چکیده
منابع مشابه
Detecting Packet-dropping faults in Mobile ad-hoc networks
Mobile Ad-hoc networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. This makes the network susceptible to Byzantyne faults with packets getting misrouted, corrupted or dropped. In this paper we propose solutions using an unobtrusive monitoring technique using the “Detection Manager” to locate malicious or faulty nodes that m...
متن کاملResisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to various types of Denial of Service (DoS) attacks. We present a distributed probing technique to detect and mitigate one type of DoS attacks, namely malicious packet dropping, in wireless ad hoc networks. A malicious ...
متن کاملBenefits of Packet Aggregation in Ad-Hoc Wireless Network
Emerging mesh networks build on IEEE 802.11 wireless local area networking technology to deliver Internet access to mobile users or to areas where traditional wired access technologies are unprofitable. Such deployments are highly bandwidth constrained; in dense urban environments many users are competing for the wireless medium and long-haul wireless backbone connections have significant conte...
متن کاملPacket Dropping Attack in MANET
Mobile Ad-hoc NETwork (MANET) is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack ...
متن کاملDetection of Vampire Attack in Wireless Ad- hoc Network
Mobile ad-hoc network is an infrastructure-less network in which the routing operation play important role in route discovery between communicating nodes. Due to infrastructure-less characteristic of ad-hoc network, it has different issues like routing, MAC layer, security etc. One of them is security issue which needs more concern. Vampire attacks modify targeted packets. It does so by prepari...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Cybernetics & Informatics
سال: 2016
ISSN: 2320-8430,2277-548X
DOI: 10.5121/ijci.2016.5213