نتایج جستجو برای: routing attacks
تعداد نتایج: 109208 فیلتر نتایج به سال:
The unique characteristics of mobile ad hoc networks, such as shared wireless channels, dynamic topologies and a reliance on cooperative behavior, makes routing protocols employed by these networks more vulnerable to attacks than routing protocols employed within traditional wired networks. We propose a specification-based intrusion-detection model for ad hoc routing protocols in which network ...
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities for applications in various domains. However, the IoT also poses security challenges due to limited resources devices its dynamic network topology. Routing attacks on 6LoWPAN-based can be particularly challenging detect because unique characteristics network. In recent years, several techniques have been ...
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central base station. In this paper, we present a method for intrusion detection in wireless sensor networks. Our intrusion detection scheme uses a clustering algorithm to build a model of normal traffic behaviour, and then uses...
Mobile Ad hoc Network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node not only acts as end system, but also as a router to forward packets. The nodes are free to move and organize themselves and change topology dynamically, establishing an optimal and efficient route between the communicating parties is the primary concern of the routing protocols of MANET...
Wireless Sensor Networks (WSN) are more subject to enemy action than conventional networks due to their hardware and energy constraints and due to hostile environment in which they can be inserted. This scenario is too favorable to denial of service attacks, especially in routing function, one critical function in any network. This work is focused in routing protecting in WSN. It presents a stu...
Most of the research in securing Mobile ad hoc networks (MANETs) has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole and rushing attacks. In this paper we broaden our previously develop algorithm AIDP and propose a generalized intrusion detection and prevention mechanism. We use a combination of anomalybased and knowledge-...
Link Expiration is a major problem in existing secure as well as non-secure routing protocols of mobile ad hoc network (MANET) and is one of the most encouraging research areas. Due to link expiration packet loss and other routing overhead increased. So, the requirement is both: secure and reliable link. Secure communication in mobile ad hoc networks is difficult due to the following factors: m...
The unprecedented growth of the Internet over the last years, and the expectation of an even faster increase in the numbers of users and networked systems, suggest that in the near future the Internet may become the single integrated communication media. However, as the dependence on the networking infrastructure grows, its security becomes a major concern, in light of the increased attempt to ...
Existing multipath routing protocols in MANETs ignore the topology-exposure problem. This paper analyzes the threats of topology-exposure and propose a TOpology-HIding multipath Protocol (TOHIP). TOHIP does not allow packets to carry routing information, so the malicious nodes cannot deduce network topology and launch various attacks based on that. The protocol can also establish multiple node-...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید