نتایج جستجو برای: routing attack
تعداد نتایج: 132575 فیلتر نتایج به سال:
MANETs are fast emerging as alternate network architecture to infrastructure networks. It is finding many applications and the constraints of processing power, memory, and bandwidth will be soon being overcome with the rapid improvement in the technologies. However the major concern which will remain is the security of the network. MANETs differ largely in the routing mechanism in the network l...
The routing system is playing a critical role in the Internet. Numerous routing security events reveal that the Internet is not so dependable yet. Some hackers even boasted that they could bring down the whole Internet in a short time. This paper investigates a new attack on BGP routing system inspired from synchronization and resonance in complex system. The attack applies routing stress by pe...
MANET’s have picked up enthusiasm of analysts in years ago. It is wireless network so that nodes move arbitrarily in the network. Zone routing protocol is kind of hybrid routing protocol. Numerous attackers are attacking on Manet due to its tendency. One attack is Jellyfish reorder attack that reorders the packets during forwarding source to destination node. This paper is subjected to correlat...
The modern wireless adhoc networks has more impact of routing attacks due to the topology changes and the problem of routing attack detection has been performed in number of approaches. The earlier methods suffer with the problem of poor detection accuracy and the performance of mitigation approaches. To overcome the issue of routing attack detection, an novel quadratic route factor estimation ...
Most of the routing protocols proposed for ad-hoc networks and sensor networks are not designed with security as a goal. Hence, many routing protocols are vulnerable to an attack by an adversary who can disrupt the network or harness valuable information from the network. Routing Protocols for wireless sensor networks are classified into three types depending on their network structure as Flat ...
Wireless ad-hoc sensor networks and routing data in them is a significant research area. The objective of this paper is to examine resource depletion attacks at the routing protocol layer, which attempts to permanently disable network nodes by quickly draining their battery power. This type of attack is called as vampire attack. Vampire attacks are very difficult to detect because they attack t...
Nodes in the DTN work on the foundation of cooperation in the network. When working in a cooperative manner, these nodes consume some network resources like bandwidth, buffer space etc. Like any other networks, DTNs are also prone to the malicious nodes and different attacks. In this work, we have proposed an attack model comprising of falsification of extended routing protocol metadata informa...
lack of infrastructure in ad hoc networks makes their deployment easier. Each node in an ad hoc network can route data using a routing protocol, which decreases the level of security. Ad hoc networks are exposed to several attacks such as the blackhole attack. In this article, a study has been made on the impact of the attack on the hybrid routing protocol ZRP (Zone Routing Protocol). In this a...
sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver data in between source and destination. In this research we work on security field in MANET ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید