نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

2016
Sukhjeet Kaur

Wireless Sensor Network is a diverse system combining of small sensors with general purpose computing elements. Although various routing protocols have been proposed for Wireless Sensor Network, most of which do not take security into account seriously. Routing attacks can have ruining effects on Wireless Sensor Network and present a major challenge when designing powerful security mechanisms. ...

2017
Kathirvel Ayyaswamy

Optimized Link State Routing (OLSR) is a in a popular proactive routing protocol for providing peer-to-peer transmissions in mobile ad hoc networks (MANETs). Since sensitive data are communicated in MANET, security remains a major issue. In this paper, we propose a trust based Multipoint Relay (MPR) selection algorithm for defending a specific type of denial-of-service (DOS) attack called node ...

2013
Mojtaba GhanaatPisheh Sanaei Imran Ghani Aida Hakemi Seung Ryul Jeong

Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru 81300, Malaysia School of Business Information Technology, Kookmin University, Korea [e-mail: [email protected], [email protected], [email protected], [email protected]] ABSTRACT: Today, usage of mobile ad hoc networks (MANET) has become favorable research subject of study due to their flexibility, mobility and se...

2017

1PG Student, Department of CSE, PDA College of Engineering, Kalaburagi, Karnataka, India. [email protected] 2Assistant Professor, Department of CSE, PDA College of Engineering, Kalaburagi, Karnataka, India. ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract -Mobile ad hoc networks (MANET) are ...

2014
Sachin Garg

Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Distributed denial of service attack is one of the security threat in which is used to make the network resources unavailable. The distributed denial of service (DDoS) a...

Journal: :CoRR 2015
George W. Kibirige Camilius Sanga

Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the wireless sensor node is their characteristics which include low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Base on those characteristics makes this network vul...

2011
E. Poornima Shoba Bindhu

As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly suscep...

2013
Vipin Khandelwal Dinesh Goyal

Causing packet loss due to attacks by malicious nodes is one of the most important problem in MANETs. There are many ways by which packet loss can occur in MANETs such as broken links, transmission errors, no route to the destination and attacks caused by malicious nodes. To determine the exact cause of packet loss in wireless network is a challenging task. In this paper, we have investigated p...

2015
Guanghua Zhang Zhenguo Chen Liqin Tian Dongwen Zhang Daqing Li

Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available...

2011
G. Nakibly F. Templin

This document is concerned with security vulnerabilities in IPv6-inIPv4 automatic tunnels. These vulnerabilities allow an attacker to take advantage of inconsistencies between the IPv4 routing state and the IPv6 routing state. The attack forms a routing loop that can be abused as a vehicle for traffic amplification to facilitate denialof-service (DoS) attacks. The first aim of this document is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید