نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

2014
Mohamed A. Abdelshafy Peter J. B. King

AODV is a reactive MANET routing protocol that does not support security of routing messages. SAODV is an extension of the AODV routing protocol that is designed to fulfil security features of the routing messages. In this paper, we study the performance of both AODV and SAODV routing protocols under the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the perform...

2008
SU-KIT TANG KIN-YEUNG WONG Luis Gonzaga Gomes

Triangle routing is one of the serious attacks to the Internet infrastructure. It can be caused by malicious routers which misroute packets to wrong directions. This kind of attacks creates network problems such as network congestion, denial of service and network partition and results in degrade of network performance. This paper gives a comprehensive study on how the path analysis combats the...

2014
Hosny M. Ibrahim Nagwa M. Omar Ebram K. William W. K. Seah J. Eriksson S. V. Krishnamurthy

Mobile ad hoc network (MANET) is vulnerable to many types of routing attacks due to its dynamic topology and the collaboration of MANET nodes in finding routing paths. The wormhole attack is considered one of the most threatening attacks. The most popular MANET routing protocols such as ad hoc on demand distance victor (AODV) are vulnerable to this security threat. In this paper, a lightweight ...

Journal: :Computers & Security 2013
Peng Zhou Xiapu Luo Rocky K. C. Chang

Trust-based onion routing enhances anonymity protection by means of constructing onion circuits using trust-based routers. However, attackers who have the knowledge of a priori trust distributions are still capable of largely reducing the anonymity protected by trustbased circuits. The root cause is that these attackers have a high probability to guess the users who initiate trust-based circuit...

2014
K. Kalpana Sampath Pallavi Vijaya Durga

Mobile Adhoc network(MANETS) are a set of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. The nodes communicate with each other by interchange of packets ,which for those nodes not in wireless range goes hop by hop. So lack of defined central authority the routing process becomes a challenging task there by leaving MANETS vuln...

2017
R Vinothini A Shalini Shahul Hameed

For many applications of the mobile ad hoc networks (MANETs) deployed in adversary environments, anonymous communications with data confidentiality and integrity is important. A major requirement is to provide unidentifiability and unlinkability to the mobile nodes and their traffics.The existing protocols are vulnerable to security threats like global eavesdropper attacks, fake routing packets...

2011
Tao Gong Bharat Bhargava Norman O. Ahmed

The user anonymity is an important security factor to protect personal privacy in mobile ad hoc networks. Recently, Wu et al. proposed an ad hoc on-demand position-based private routing protocol (AO2P), but the AO2P is vulnerable to some collaborative attacks, such as blackhole & wormhole attacks. Once any compromised node is included in a route, it can conduct different attacks, which are very...

2003
Gabi Nakibly Michael Arov

IPv6 is the future network layer protocol for the Internet. Since it is not compatible with its predecessor, some interoperability mechanisms were designed. An important category of these mechanisms is automatic tunnels, which enable IPv6 communication over an IPv4 network without prior configuration. This category includes ISATAP, 6to4 and Teredo. We present a novel class of attacks that explo...

2014
Mr. M. Vinoth Ms. N. Radhika

The multi hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh networ...

2007
Ying Zhang Zhuoqing Morley Mao Jia Wang

Compared to attacks against end hosts, Denial of Service (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their global impact on many networks. We discover that the recently identified low-rate TCP-targeted DoS attacks can have severe impact on the Border Gateway Protocol (BGP). As the interdomain routing protocol on today’s Inte...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید