نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

2014
Clarita T. Pinto Jeroen Hoebeke Ingrid Moerman Bart Dhoedt C. E. Perkins E. M. Belding Zaid Ahmad Kamarularifin Abd Jamalul-lail Ab Manan Humaira Ehsan Farrukh Aslam Khan Satoshi Kurosawa Hidehisa Nakayama Nei Kato Abbas Jamalipour Yogesh Chaba R. B. Patel Rajesh Gargi Ajith Abraham Crina Grosan

Mobile ad hoc networks (MANETs) are infrastructure less networks which consist of dynamic collection of nodes with rapidly changing topologies of wireless links. MANETS are mobile and therefore, they use wireless connections to connect to various networks. Devices in range can communicate in a point-to-point fashion. MANETs are liable to different types of DoS attacks in which packets are dropp...

2007
Ying Zhang Zhuoqing Morley Mao Jia Wang

Compared to attacks against end hosts, Denial of Service (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their global impact on many networks. We discover that the recently identified low-rate TCP-targeted DoS attacks can have severe impact on the Border Gateway Protocol (BGP). As the interdomain routing protocol on today’s Inte...

2015
R. Vijayakumar Shankar Kumar

A mobile ad-hoc network is a group of mobile nodes which can communicate between them without the help of any centralized infrastructure. It consists of number of mobile nodes with exceptional quality of selfmanaging and self-organizing network. Military operations and disaster management are the important applications of MANET. In preventing routing attacks routing protocols plays a significan...

2013
Haixia Zhao Yaowei Li Jincheng Shen Mingchuan Zhang Ruijuan Zheng Qingtao Wu

Geographical and Energy Aware Routing (GEAR) is an efficient routing protocol in wireless sensor networks (WSN). It behaves well in the face of routing attacks, but it is incapable of defending bogus routing information, sybil attack and selective forwarding. Aimed at this problem, this paper present a location pairwise keys bootstrap scheme based secure geographical and energy aware routing pr...

2012
Kamini Maheshwar Divakar Singh

In Mobile Wireless Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. It must discover its local neighbors and through them it will communicate to nodes that are out of its transmission range. Various features like open medium, dynamic topology, lack of clear lines of defense, makes MANET vulnerable to security attacks. Ad hoc on...

2013
A. V. R. Sandesh Guptha S. Reshma

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...

2016
A. R. Rajeswari K. Kulothungan A. Kannan

In multi-hop wireless ad hoc network, the packets are transmitted through intermediate nodes to reach the destination. In this topological structure, there is no centralized co-ordinating, monitoring or control point. Due to this type of network environment, an intermediate node can act as either selfish or malicious to drop packets. The primary objective of such an untrustworthy behavior of th...

Journal: :JNIT 2010
Yujing Liu Bofeng Zhang Fei Wang Jinshu Su

BGP prefix hijacking is a sort of serious security threat of the Internet. In a hijacking attack, the attacker try to convince ASes to become infectors for redirecting data traffic to him in stead of the victim. The more infectors there are, the larger impact an attack has. It is important to understand the root of the matter why the impact of prefix hijacking differs a lot in different attacks...

2010
Ejiro .E. Igbesoko Mona Ghassemian

Security in Mobile Ad Hoc Networks (MANETs) has received lots of research attention in recent years. With the proliferation of mobile devices and the inherent characteristics of MANETs as self-organized and self-configuring networks, a great need to address security concerns in these networks have arisen. Security in these networks could be looked at from various view points with respect to dif...

2013
Anuradha Garg Ajay Tiwari Hemant Kumar Garg

For the energy limited wireless sensor networks, the critical problem is how to achieve the energy efficiency. Many attackers can consume the limited network energy, by the method of capturing some legal nodes then control them to start DoS and flooding attack, which is difficult to be detected by only the classic cryptography based techniques with common routing protocols in wireless sensor ne...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید