نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

2015
Mihir Bellare Ran Canetti Hugo Krawczyk Yih-Chun Hu Adrian Perrig David B. Johnson Hao Yang Haiyun Luo Fan Ye Songwu Lu Rashid Hafeez Khokhar Md Asri Ngadi

A number of attacks exist at the network layer, i.e. against routing protocols. One of the most severe attacks is the wormhole attack, which consists of at least two colluding attackers, located

2007
Jing Dong Brett Bavar Cristina Nita-Rotaru

Wireless sensornet designs have evolved in recent years, from primarily focusing on data collection to more sophisticated tasks such as data centric storage [7]. Likewise, the requirements on the network support have also changed, from the basic many-to-one and one-to-many communications to more sophisticated point-to-point communications. To address the unique challenges for point-to-point rou...

Journal: :International journal of scientific research in computer science, engineering and information technology 2023

In modern times, security remains a significant concern in wireless networks. Wireless sensor networks are widely employed different practical situations. WSNs struggle with numerous internal and external threats, detecting defending against insider attacks is difficult. Insider attacks, which intruders discard received data packets selectively, pose risk to WSNs. The presence of black hole nod...

2010
Ejiro .E. Igbesoko Mona Ghassemian

Security in Mobile Ad Hoc Networks (MANETs) has received lots of research attention in recent years. With the proliferation of mobile devices and the inherent characteristics of MANETs as self-organized and self-configuring networks, a great need to address security concerns in these networks have arisen. Security in these networks could be looked at from various view points with respect to dif...

2012
Ashwani Kumar

Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, we focus on fundamental security attacks in Mobile adhoc networks. MANET has no clear line of defense, so, it is accessible to bo...

2006
Chinyang Henry Tseng Shiau-Huey Wang Calvin Ko Karl N. Levitt

A Mobile Ad Hoc Network (MANET) is a distributed communication platform for mobile wireless nodes. Because of the lack of a centralized monitoring point, intrusion detection systems (IDS) for MANET are usually developed using a distributed architecture where detectors are deployed at each node to cooperatively detect attacks. However, most of these distributed IDS simply assume that each detect...

2014
Sunil Bhutada

An Ad-Hoc network is collection of wireless mobile nodes forming a temporary network without the use of any established infrastructure or fixed centralized administration. In Ad-Hoc networks the communicating nodes do not depend on a fixed infrastructure, which sets a new challenge for the necessary security architecture which they apply. In such an environment, it is necessary for one mobile n...

2004
S. Murphy

Routing protocols are subject to attacks that can harm individual users or network operations as a whole. This document provides a description and a summary of generic threats that affect routing protocols in general. This work describes threats, including threat sources and capabilities, threat actions, and threat consequences, as well as a breakdown of routing functions that might be attacked...

2010
Oliviu C. Ghica Cristina Nita Goce Trajcevski Peter Scheuermann Cristina Nita-Rotaru

g (EFR) is a form of geographical multirkload-balancing problem. However, it assumes that the -based routing protocols can be subject to various attacks. -based routing protocols. More -Pole Field Persistent Routing -effort, they can be highly destructive to s workload balanced operation. We present extensive

Journal: :IEEE Access 2023

Internet of Things (IoT) has revolutionized the world in last decade. Today millions devices are connected to each other utilizing IoT technology one way or other. With significant growth devices, provision security is imperative. Routing protocol for low power and lossy networks (RPL) a network layer protocol, specially designed routing devices. RPL faces many attacks such as selective forward...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید