نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

2003
Dong Xuan Sriram Chellappan Muralidhar Krishnamoorthy

In this paper, we propose a variant of Chord system that is resilient to routing attacks. By routing attacks, we mean the attacks which detour the looking up messages, aiming to disrupt the performance of data look-up systems by increasing the path length of queries. Chord routes messages uni-directionally and has no bi-directional edges. While its performance in the absence of routing attacks ...

Journal: :Journal of Computer Security 2005
Antonio Pescapè Giorgio Ventre

Nowadays attacks against the routing infrastructure are gaining an impressive importance. Therefore, approaches to network security and reliability must take into account effects of routing protocols attacks and consequently must consider techniques to protect the network infrastructure. However, in spite of an increasing attention by scientists and practitioners to this issue, there is still a...

Journal: :JIPS 2010
Lukman Sharif Munir Ahmed

Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastat...

Journal: :Communications of The ACM 2021

Application-layer and network-layer defenses are critical for fortifying routing attacks.

Journal: :Ad Hoc Networks 2003
Chris Karlof David A. Wagner

We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks aga...

2010
Saju P John Philip Samuel

Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. We refer to any arbitrary action by authenticated nodes resulting in disruption of the routing service such as drop packets, modify packets and miss-route packets as Byzantine behavior, and to such an adversary as a Byzantine adversary. Nodes may exhibit Byzantine beh...

2011
Alex Kirshon Gabi Nakibly

Open Shortest Path First (OSPF) is the most popular interior gateway routing protocol on the Internet. Most of the known OSPF attacks are based on falsifying the link state advertisement (LSA) of an attacker-controlled router. These attacks may create serious damage if the attacker-controlled router is strategically located. However, these attacks can only falsify a small portion of the routing...

Journal: :Wireless Personal Communications 2013
Theodore B. Zahariadis Panagiotis Trakadas Helen-Catherine Leligou Sotiris Maniatis Panagiotis Karkazis

Wireless sensor networks are vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. The applicability of legacy security solutions is disputable (if not infeasible), due to severe restrictions in node and network resources. Although confidentiality, integrity and authentication measures assist in preventing specific types of attacks, they com...

2015
N. Sumathi

In Mobile Adhoc Networks (MANETs), routing attacks are considered as a serious issue. However, in the presence of malicious nodes, the networks are affected by various kinds of attacks. The malicious node(s) can attack a MANET in different ways, such as sending fake messages several times; fake routing information and advertising fake links to disrupt routing operations. Black hole attacks are ...

2014
Mohamed A. Abdelshafy Peter J. B. King

AODV is a well-known reactive protocol designed for MANET routing. All MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. In this paper, we study the performance of AODV routing protocol in the presence of some of the well-defined attacks in MANET. We use NS-2 network simulator to analyse th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید