نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

2015
F. MEZRAG M. BENMOHAMMED B. BOUDERAH

The hierarchical routing protocols based on clusters rely fundamentally on their CHs for data aggregation and routing. They are vulnerable to several attacks, such as Hello flood, Selective forwarding, replay, etc; attacks involving CH are the most damaging. If a malicious node managed to become a CH, it can launch attacks to disrupt the network operation. Note that, the malicious node can choo...

Journal: :Ad Hoc Networks 2007
Rosa Mavropodi Panayiotis Kotzanikolaou Christos Douligeris

Multipath routing in ad hoc networks increases the resiliency against security attacks of collaborating malicious nodes, by maximizing the number of nodes that an adversary must compromise in order to take control of the communication. In this paper, we identify several attacks that render multipath routing protocols vulnerable to collaborating malicious nodes. We propose an on-demand multipath...

2013
Haixia Zhao Yaowei Li Jincheng Shen Mingchuan Zhang Ruijuan Zheng Qingtao Wu

Geographical and Energy Aware Routing (GEAR) is an efficient routing protocol in wireless sensor networks (WSN). It behaves well in the face of routing attacks, but it is incapable of defending bogus routing information, sybil attack and selective forwarding. Aimed at this problem, this paper present a location pairwise keys bootstrap scheme based secure geographical and energy aware routing pr...

Journal: :CoRR 2012
Robert Lychev Sharon Goldberg Michael Schapira

The Border Gateway Protocol (BGP) sets up routes between the smaller networks that make up the Internet. Despite its crucial role, BGP is notoriously vulnerable to serious problems, including (1) propagation of bogus routing information due to attacks or misconfigurations, and (2) network instabilities in the form of persistent routing oscillations. The conditions required to avoid BGP instabil...

2003
Cedric Adjih Thomas Clausen Philippe Jacquet Anis Laouiti Paul Mühlethaler Daniele Raffo

In this paper, we examine security issues related to proactive routing protocols for MANETs. Specifically, we investigate security properties of the Optimized Link-State Routing Protocol one example of a proactive routing protocol for MANETs. We investigate the possible attacks against the integrity of the network routing infrastructure, and present techniques for countering a variety of such a...

2009
Ioannis Avramopoulos Martin Suchara

DNS is a critical piece of the Internet supporting the majority of Internet applications. Because it is organized in a hierarchy, its correct operation is dependent on the availability of a small number of servers at the upper levels of the hierarchy. These backbone servers are vulnerable to routing attacks in which adversaries controlling part of the routing system try to hijack the server add...

Journal: :Proceedings on Privacy Enhancing Technologies 2016

Journal: :International Journal for Innovation Education and Research 2019

2011
UMANG SINGH

Mobile Ad hoc Networks are assortment of mobile terminals or nodes, allowing no stationary infrastructure and centralized administration. A performance evaluation of routing protocol is very cumbersome due to various metrics involving dynamic topologies, mobility, routing limited resources, security etc. In this paper, various existing routing protocols were reviewed. It has been analyzed that ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید