Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures

Network coding has attracted the attention of many researchers in security and cryptography. In this paper, a well know attack selective forwarding attack will be studied in network coding systems. While most of the works have been dedicated to the countermeasure against pollution attacks where an attacker modifies intermediate packets, only few works concern selective forwarding attacks on dat...

متن کامل

Network Coding Security: Attacks and Countermeasures

By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the diff...

متن کامل

Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures

In this paper, we analyze several recent schemes for watermarking network flows that are based on splitting the flow into timing intervals. We show that this approach creates time-dependent correlations that enable an attack that combines multiple watermarked flows. Such an attack can easily be mounted in nearly all applications of network flow watermarking, both in anonymous communication and ...

متن کامل

Selective Forwarding Attacks Detection in WSNs

Wireless sensor networks (WSNs) contain numerous sensors. These sensors communicate with a vast number of small nodes via radio links. Therefore, WSNs have the most security attacks cause the limited cpacity of sensor nodes. The security attacks impact to many applications ...

متن کامل

Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT †

Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large ho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Networks and Communications

سال: 2012

ISSN: 2090-7141,2090-715X

DOI: 10.1155/2012/184783