نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

Journal: :Ad Hoc Networks 2014
Yujun Zhang Tan Yan Jie Tian Qi Hu Guiling Wang Zhongcheng Li

Existing multipath routing protocols in MANETs ignore the topology-exposure problem. This paper analyzes the threats of topology-exposure and propose a TOpology-HIding multipath Protocol (TOHIP). TOHIP does not allow packets to carry routing information, so the malicious nodes cannot deduce network topology and launch various attacks based on that. The protocol can also establish multiple node-...

Journal: :CoRR 2009
E. A. Mary Anita V. Vasudevan

A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. The wireless and dynamic nature of ad-hoc networks makes them vulnerable to attacks especially in routing protocols. Providing security in mobile ad-hoc networks has bee...

2017
Rupinder Singh Ravinder Singh Jatinder Singh

Wireless Sensor network routing protocols are prone to various attacks as these protocols mainly provide the function of routing data towards the sink. LEACH is a one of the routing protocol used for clustered implementation of wireless sensor network with Received Signal Strength based dynamic selection of Cluster Heads. But, as with other routing protocols, LEACH is also prone to HELLO flood ...

2003
Mohit Lad Xiaoliang Zhao Beichuan Zhang Daniel Massey Lixia Zhang

Although the Internet routing infrastructure was not a direct target of the January 2003 Slammer worm attack, the worm attack coincided in time with a large, globally observed increase in the number of BGP routing update messages. Our analysis shows that the current global routing protocol BGP allows local connectivity dynamics to propagate globally. As a result, any small number of edge networ...

Journal: :Computers & Security 2017
Hatem Ismail Daniel Germanus Neeraj Suri

Peer-to-Peer (P2P) protocols underlie multiple networked applications given that the P2P decentralized design inherently fosters scalability and robustness. While distributiveness and scalability are attractive features, these facets also increase exposure to malicious peers which can propagate malicious routing information. Accordingly, a diverse set of continuously evolving attacks can be mou...

2015
Ankita Shrivastava Rakesh Verma

Mobile ad-hoc network is an infrastructure-less network in which the routing operation play important role in route discovery between communicating nodes. Due to infrastructure-less characteristic of ad-hoc network, it has different issues like routing, MAC layer, security etc. One of them is security issue which needs more concern. Vampire attacks modify targeted packets. It does so by prepari...

2016
Anuradha Jayakody Rohan Samarasinghe Saluka R. Kodituwakku

In nature of the transmission medium the broadcast, Wireless sensor networks are vulnerable to security attacks. The nodes are placed in a hostile or dangerous environment where they are not tangibly safe in the MANETs. In many application, the data obtained from the sensing nodes need a false, or malicious node could intercept private information or could send false messages to nodes in the ne...

2008
N. Boris Margolin Brian Neil Levine

Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applications and protocols are more robust against the attack than others. In our approach, for each distributed application and an attacker objective, there is a critical value that determines the costeffectiveness of the at...

2014
Amir Houmansadr Edmund L. Wong Vitaly Shmatikov

Decoy routing is a recently proposed approach for censorship circumvention. It relies on cooperating ISPs in the middle of the Internet to deploy the so called “decoy routers” that proxy network traffic from users in the censorship region. A recent study, published in an award-winning CCS 2012 paper [24], suggested that censors in highly connected countries like China can easily defeat decoy ro...

2016
Karthikeyan Thyagarajan Arunkumar Thangavelu

Distributed Denial-of-Service (DDoS) attacks are a variant of Denial-of-Service (DoS) attacks where an attacker or a group of attackers employ multiple machines to carry out a DoS attack simultaneously, therefore increasing its effectiveness and strength. DDoS attacks in the networks needs to be prevented or handled if it occurs, as early as possible and before reaching the victim. Dealing with...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید