Wormhole Attack Detection and Prevention Using EIGRP Protocol Based on Round Trip Time
نویسندگان
چکیده
منابع مشابه
Round Trip Time based Wormhole Attacks Detection
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc networks is wormhole attacks and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas This paper analyzes the nature of wormhole attack and existing methods of defending mec...
متن کاملWormhole Attack Detection and Prevention in Mobile Ad-hoc Network Using Authentication Based Delphi
As Mobile Ad-hoc network is infrastructure less network in which every node can take part in data transmission and reception process. Various kinds of attacks have been arises in the network during transmission, which affects on the performance of the network. Wormhole attack is one attack from them which is created by collaborative attackers. Different techniques have developed to detect & pre...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملZero Round-Trip Time for the Extended Access Control Protocol
The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. While originally used in the context of identity card systems and machine readable travel documents, the EAC protocol is increasingly adopted as a universal solution to secure transactions or for attribute-based access control with smart cards. Here we discuss how to enhance the...
متن کاملPredicting Round Trip Time for the TCP Protocol
The TCP protocol has been using the same algorithm to predict the next round trip time since the 1980’s. When most Internet traffic consisted of wired Ethernet routes, this made sense, however, with the advent of mobile, wireless Internet usage new methods are needed. This paper discusses the Fixed Share, Follow the Leader and Max Hedge Plus online machine learning algorithms as potential repla...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cyber Security and Mobility
سال: 2018
ISSN: 2245-4578,2245-1439
DOI: 10.13052/2245-1439.7115