نتایج جستجو برای: routing attack
تعداد نتایج: 132575 فیلتر نتایج به سال:
This paper aimed at the detection of wormhole attack and proposed a new method called as Neighbour Node Ratio Adhoc On demand Distance Vector Routing (NNR-AODV). NNR-AODV is an extended version traditional AODV routing protocol. The calculates neighbour node count for every based on that it will decide whether present or not. Furthermore, able to detect both external internal attacked nodes. Al...
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a rel...
Mobile Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure and centralized administration. Due to security vulnerabilities of the routing protocols, Mobile ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the Selfish Attack against network integrity absorbing all routing packets as well as...
As sensor-driven applications become progressively more integrated into our lives; issues linked to sensor privacy will become increasingly important. In wireless sensor networks, adversaries can make use of the traffic information for locating the monitored objects. Network coding has been shown to be an efficient approach to improve the wireless system performance. In a wormhole attack, the a...
Due to dynamic topology and non-wired infrastructure of Wireless Sensor Networks (WSN), they are prone to attacks. Wormhole attack is one of the most popular and serious attack in WSNs. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multi-path rou...
Denial of Service (DoS) attacks are difficult to prevent and protect against. In this paper we focus on DoS attacks in wireless ad hoc networks that propagate from MAC to routing layer, causing breaking of critical routes. We present several traffic patterns that an intelligent attacker can generate to cause Denial of Service attack in one or several nodes in ad hoc networks. More specifically,...
Properties of Mobile Ad hoc Networks (MANETs) present major vulnerabilities in security. The threats considered in MANETs may be due to maliciousness of a node that intentionally disrupts the network by using variety of attacks and/or due to selfishness of the node which does not perform certain operations due to a wish to save power. None of the existing algorithms to mitigate black hole attac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید