نتایج جستجو برای: routing attacks
تعداد نتایج: 109208 فیلتر نتایج به سال:
We present a network coding security method capable of detecting several routing attacks in wireless reconfigurable networks. Routing security attacks include selective forwarding, black holes, and wormholes. The proposed method performs linear network coding over intermediate nodes composing a given route, not only to distribute content, but also to provide data confidentiality by cooperation ...
The main purpose of an ad hoc network routing protocol is to enable the transport of data packets from one point to another. This paper examines the potential attacks on this transport service which arise from the realisation of threats from internal malicious nodes. The prerequisite of a routing service is a distributed mechanism for the discovery and maintenance of routes; network integrity a...
For most existing routing protocols of mobile ad hoc network (MANET), more efficient security mechanisms against the attacks from malicious, compromised and selfish nodes are highly demanded. This paper proposes a series of security mechanisms for the Ad-hoc On-demand Distance Vector (AODV) Routing protocol. Three techniques, including digital signature, one-way hash function and double one-way...
The Internet is an integral part of today’s way of life and a critical business infrastructure at the same time. Since its early beginnings, resilience has been embedded deeply into the fabric of Internet routing. It is highly resistant against random outages and, in theory, immune to major blackouts. To sustain this quality, routers constantly exchange network reachability information to ident...
Most of the multicast routing protocols proposed for ad hoc networks assume a trusted, non-adversarial environment and do not take security issues into account in their design. In this paper, we investigate the security of MAODV (Multicast Ad hoc On-Demand Distance Vector protocol), a well-known multicast routing protocol, and identify several attacks on it. We show, via simulation, that these ...
It is critical to protect the network infrastructure (e.g., network routing and management protocols) against security intrusions, yet dealing with insider attacks are probably one of the most challenging research problems in network security. We study the security threats, especially internal/insider threats, for the standardized routing protocol OSPF. In OSPF, a group of routers collaborate, ...
Anonymous routing protocols are used in MANET’s to hide the nodes from outsiders in order to protect from various attacks. HPAR partitions the network area dynamically into zones and chooses nodes in zones randomly as intermediate relay nodes .This relay nodes help in secure routing. In HPAR anonymity protection is given to source, destination and route. HPAR have low cost and provide high leve...
To address the vulnerability of geographic routing to multiple security threats such as false routing information, selective forwarding and the Sybil attack in wireless sensor networks, this paper proposes a trust-based defending model against above-mentioned multiple attacks. Considering the characteristics of resource-constrained sensor nodes, trust values of neighboring nodes on the routing ...
In this paper we address the problem of local balancing in multi-hop wireless networks. We introduce the notion of proactive routing: after a short pre-processing phase in which nodes build their routing tables by exchanging messages with neighbors, we require that nodes decide the relay of each message without any further interaction with other nodes. Besides delivering very low communication ...
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that launch selective forwarding attacks. SeRINS (a Secure alternate path Routing IN Sensor networks) detects and isolates the compromised nodes, which try to inject inconsistent routing information, from the network by neighbo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید