نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

Journal: :International Journal of Computer Applications 2017

Journal: :Wireless Communications and Mobile Computing 2006
Xiaoyan Hong Jiejun Kong Mario Gerla

Privacy in mobile ad hoc networks has new semantics in addition to the conventional notions for infrastructure networks. Mobility enabled by wireless communication has significantly changed privacy issues and anonymity research in many ways. In particular, mobility requires ad hoc routing schemes to transmit messages frequently in an open wireless medium. The routing traffic facilitates adversa...

2015
R. Vijayakumar Shankar Kumar

A mobile ad-hoc network is a group of mobile nodes which can communicate between them without the help of any centralized infrastructure. It consists of number of mobile nodes with exceptional quality of selfmanaging and self-organizing network. Military operations and disaster management are the important applications of MANET. In preventing routing attacks routing protocols plays a significan...

2013
Sridhar Reddy Venkateswara Rao

Attacks in wireless sensor networks are Compromised-node and denial-of-service (DOS). In the Compromised-node attack (CN attack); an adversary physically compromises a subset of nodes to eavesdrop information, whereas in the denial-of-service attack, the adversary interferes with the normal operation of the network by actively disrupting, changing, or even paralyzing the functionality of a subs...

2010
Jamil Ibriq Imad Mahgoub Mohammad Ilyas

Wireless sensor networks (WSN) is an emerging area that has a wide spectrum of critical applications like battlefield surveillance, emergency disaster relief systems, etc. Sensor devices used in such networks are designed to operate with limited resources. Therefore, they are simple to build, economically viable and can be deployed to closely interact with their environment. In order to reduce ...

2003
Dijiang Huang Amit Sinha Deep Medhi

Network survivability has been studied extensively from the view of node and link failures. The domain of survivability goes beyond just the physical failures and one needs to address this issue when faced with security threats that can render the network logically dysfunctional without causing any physical damage. There are several security threats a network routing protocol such as the linkst...

2016
Karthikeyan Thyagarajan Arunkumar Thangavelu

Distributed Denial-of-Service (DDoS) attacks are a variant of Denial-of-Service (DoS) attacks where an attacker or a group of attackers employ multiple machines to carry out a DoS attack simultaneously, therefore increasing its effectiveness and strength. DDoS attacks in the networks needs to be prevented or handled if it occurs, as early as possible and before reaching the victim. Dealing with...

2011
G. Nakibly F. Templin

This document is concerned with security vulnerabilities in IPv6-inIPv4 automatic tunnels. These vulnerabilities allow an attacker to take advantage of inconsistencies between the IPv4 routing state and the IPv6 routing state. The attack forms a routing loop that can be abused as a vehicle for traffic amplification to facilitate denialof-service (DoS) attacks. The first aim of this document is ...

2011
G. Nakibly F. Templin

This document is concerned with security vulnerabilities in IPv6-inIPv4 automatic tunnels. These vulnerabilities allow an attacker to take advantage of inconsistencies between the IPv4 routing state and the IPv6 routing state. The attack forms a routing loop that can be abused as a vehicle for traffic amplification to facilitate denialof-service (DoS) attacks. The first aim of this document is ...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید