نتایج جستجو برای: routing attacks
تعداد نتایج: 109208 فیلتر نتایج به سال:
The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh network...
In this paper, a readily deployable trust and energy-aware routing protocol is presented. A distributed trust management system incorporating direct and indirect trust information is used to detect and avoid malicious nodes performing routing attacks as well as attacks threatening the reputation exchange process. Also, the energy-awareness is relied upon to extend the network lifetime. Although...
-------------------------------------------------------------------ABSTRACT-------------------------------------------------------------In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as bl...
Mobile Ad hoc Networks are extremely exposed to attacks because of the self-motivated nature of its network infrastructure. Out of all these attacks, routing attacks need sizeable attention since it could root the most upsetting harm to MANET. There exist several intrusion response techniques to mitigate such critical attacks, still the existing solutions typically attempt to isolate malicious ...
Mobile Ad hoc Networks (MANET) are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks, the routing attacks getting more attention because its changing the whole topology itself and it causes more damage to MANET. Even there are lot of intrusion detection Systems available to diminish those critical attacks, existing causesunexpe...
The risks to users of wireless technology have increased as the service has become more popular. Due to the dynamically changing topology, open environment and lack of centralized security infrastructure, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and to ad hoc routing attacks. There are a wide variety of routing attacks that target the weakness of MANETs. ...
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals, and then studies how to achieve these goals through misuses of the routing messages. To facilitate the analysis, it classifies insider attacks into two categories: atomic misuses an...
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals and then study how to achieve these goals through misuses of the routing messages. To facilitate the analysis, this paper classifies the insider attacks into two categories: atomic m...
A Mobile Ad-hoc Network (MANET) is a group of wireless mobile devices or nodes that communicate with each other without any help of a pre-installed infrastructure and centralized access points. The mobility and the easy use of mobile devices have motivated researches, to develop MANET protocols to exploit a reliable communication facilities provided by these devices. There are number issues suc...
Mobile Ad hoc NETworks (MANETs) are decentralized environments comprised of mobile computing devices that interact among each other via multi-hop wireless links. MANET nodes forward packets on behalf of other nodes in the network. Such routing decisions are made autonomously by individual nodes. MANET characteristics make them highly vulnerable to a myriad of physical and cyber attacks. Cryptog...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید