نتایج جستجو برای: routing attack
تعداد نتایج: 132575 فیلتر نتایج به سال:
R.SOMASUNDARAM, DR.P.SIVAKUMAR AND K.SUMITHRA M.Tech Student., Department of Computer Science and Engineering, Manakula Vinayagar Institute of Technology, Pondicherry University, Pondicherry, India. [email protected]. 2 Associate Professor, Department of Information Technology, Manakula Vinayagar Institute of Technology, Pondicherry University, Pondicherry, India. -----------------------...
Mobile ad hoc network (MANET) is an autonomous self-configuring infrastructure-less wireless network. MANET is vulnerable to a lot of routing security threats due to unreliability of its nodes that are highly involved in the routing process. In this paper, a new technique is proposed to enhance the security of one of the most popular MANET routing protocols that is called Ad hoc on Demand Dista...
Attacks in wireless sensor networks are Compromised-node and denial-of-service (DOS). In the Compromised-node attack (CN attack); an adversary physically compromises a subset of nodes to eavesdrop information, whereas in the denial-of-service attack, the adversary interferes with the normal operation of the network by actively disrupting, changing, or even paralyzing the functionality of a subs...
Mobile ad hoc networks (MANETs) are infrastructure-free in which nodes free to move any direction. These use specific routing protocols that can create a path between not within transmission range of each other. Because MANETs easy configure, they mostly used areas where infrastructure is available, such as military and rescue operations, etc. Due the open approach, always vulnerable external i...
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANETs). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black h...
Today’s interdomain routing system does not perform well, because the BGP protocol converges slowly, selects paths without regard for performance, does not support multipath routing, and has numerous security vulnerabilities. Rather than adding mechanisms to an already complex protocol, or redesigning interdomain routing from scratch, we propose making BGP simpler, and handling issues such as d...
A Secure AODV Protocol Based on Distributed EigenTrust Algorithm against Packet Drop Attacks in WMNs
In view of the increasing threats to routing protocols of the wireless mesh networks (WMNs), reputation mechanisms are widely used to mitigate the effects of routing attacks. However, in many reputation schemes different nodes generally hold various opinions about one’s reputation value. To compute a comprehensive and consensus reputation for each node in the WMN, this paper improves a distribu...
A mobile ad-hoc network (MANET) is wireless and an autonomous system such that nodes are move randomly in network. Every node to maintain host and router in network layer. The principal of routing protocol is Ad-hoc on demand Distance Vector (AODV). It is used node to node routing. AODV is searching path from source to destination in ad-hoc network. The network layer in OSI model so use many ty...
AODV is a reactive MANET routing protocol that is vulnerable to a dramatic collapse of throughput when malicious intruders flood the network with bogus route requests. We introduce a simple mechanism to resist such attacks that can be incorporated into any reactive routing protocol. It does not require expensive cryptography or authentication mechanisms, but relies on locally applied timers and...
We present an effective Sybil attack [12] against social location based services. Our attack is based on creating a large number of reputed “bot drivers”, and controlling their reported locations using fake GPS reports. We show how this attack can be used to influence social navigation systems by applying it to WAZE [8] a prominent social navigation application used by over 50 million drivers. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید