نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

2006
Lei Guang Chadi Assi Abderrahim Benslimane

In this paper, we demonstrate a new class of protocol-compliant exploits that initiates at the MAC layer but targets ad hoc on-demand routing mechanisms. A misbehaved node implementing this type of attacks completely follows the specifications of IEEE802.11 standard and the existing on-demand routing protocols. However, it can cause routing shortcut attacks or detour attacks. We detail the expl...

2011
Dalip Kamboj Pankaj Kumar Sehgal

The paper surveyed and compared various secure routing protocols for the mobile ad hoc networks (MANETs). MANETs are vulnerable to various security threats because of its dynamic topology and selfconfigurable nature. Security attacks on ad hoc network routing protocols disrupt network performance and reliability. The paper significantly based on base routing protocol AODV and Secure protocol ba...

2010
V. Venkata Ramana

In our proposed research work different security attacks from the perspective of layer approach are identified. The impacts of security attacks on each layer are studied. Then we focus on security attacks on network layer in particular routing. Different solutions for different security attacks will be proposed. For this widely proposed Adhoc network routing protocols DSR and AODV are used.

2006
Matthew Bishop Xin Liu Chin-Yang Henry Tseng

A mobile ad hoc Network (MANET) is a mobile mesh network in which mobile wireless nodes are both hosts and routers so they can communicate without base stations. Because of this cooperative routing capability, MANETs have envisioned for military and emergency communication, but become more vulnerable to routing attacks than wired networks. If a malicious node propagates forged routing informati...

2013
Sunita Choudhary Poonam Dabas

MANET became a popular research area among researchers due to their flexibility and independence of network infrastructures. Routing in MANET is a challenging issue due to dynamic network topology, limited bandwidth, and limited battery power. Early work in MANET research has mainly focused on various kinds of attacks to find and remove malicious nodes. In MANET, routing attacks are particularl...

2004
Baruch Awerbuch Reza Curtmola David Holmer Cristina Nita-Rotaru Herbert Rubens

Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the network are referred to as Byzantine attacks. Traditional secure routing protocols are vulnerable to this class of attacks since they usually assume that once authenticated, a node can be trusted to execute the protocol correctly. We present a detailed description of several By...

2003
Luiz Olavo S. Rocha Luís Henrique Maciel Kosmalski Costa Otto Carlos Muniz Bandeira Duarte

Routing is the key issue for ad hoc networks due to the wireless medium, absence of infra-structure and distributed operation. In ad hoc networks, every node acts as a router. Hence, securing the routing mechanism is a critical issue. This paper analyzes attacks that exploit the vulnerabilities of the ad hoc routing mechanisms. The attacks are based on the malicious behavior of some network nod...

2012
Shyamala Ramachandran Valli Shanmugam

Routing is a basic step for data exchange. In wireless ad-hoc networks each node acts as a router and executes a routing protocol. Wireless ad-hoc networks are highly resource constrained in terms of network topology, memory and computation power. The reliable data transfer is a difficult task in wireless ad-hoc networks because of resource constraints. A mobile ad-hoc network (MANET) is a kind...

2011
E. Poornima Shoba Bindhu

As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly suscep...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید