نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

2008
Le Xuan Hung Ngo Trong Canh Sungyoung Lee Young-Koo Lee Heejo Lee

For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, stu...

2005
Jakob Eriksson Michalis Faloutsos Srikanth Krishnamurthy

Open, self-organized networks present a formidable routing security challenge. When strangers are allowed to join the network as full citizens rather than just guests with limited privileges, new security paradigms must be adopted. Instead of making use of manual configuration phases or online certification authorities, we must rely on the routing layer to be robust against all manner of attack...

2014
Hisham Mustafa Yan Xiong Khalid Elaalim

Due to their unique characteristics, such as the dynamic changing topology, the absence of central management, the cooperative routing mechanisms, and the resources constraints, Mobile ad hoc networks (MANETs) are relatively vulnerable to both active and passive attacks. In MANET, routing attacks try to disrupt the functions of routing protocol by intentionally or unintentionally dropping packe...

2013
A. V. R. Sandesh Guptha S. Reshma

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...

2016
Celia John

The demand for security is increasing day by day because of the awareness, technology and the increased applications of wireless networks, so there is a need to secure routing protocols which traverses across networks and contains user data. However, Wireless Sensor Networks (WSN) are vulnerable to various kinds of attacks and existing security mechanisms are not robust enough in the deployment...

Journal: :CoRR 2012
Akshai Aggarwal Savita Gandhi Nirbhay Chaubey Pathik Shah Madhvi Sadhwani

Mobile Ad hoc Network (MANET) is a collection of mobile nodes that can communicate with each other using multihop wireless links without requiring any fixed based-station infrastructure and centralized management. Each node in the network acts as both a host and a router. In such scenario, designing of an efficient, reliable and secure routing protocol has been a major challenging issue over th...

2013
Adi Sosnovich Orna Grumberg Gabi Nakibly

This paper presents a novel approach to automatically finding security vulnerabilities in the routing protocol OSPF – the most widely used protocol for Internet routing. We start by modeling OSPF on (concrete) networks with a fixed number of routers in a specific topology. By using the model checking tool CBMC, we found several simple, previously unpublished attacks on OSPF. In order to search ...

2012

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...

2014
Mahesh Kumar Kumawat

Mobile Ad-Hoc Networks (MANETs) are becoming increasingly popular as more and more mobile devices find their way to the public, besides ―traditional‖ uses such as military battlefields and disaster situations. They are being used step by step in every-day stages. With this increased usage of MANETs comes the need for making the networks secure as well as efficient, something that is not readily...

2013
Chandra Reddy

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید