نتایج جستجو برای: routing attacks
تعداد نتایج: 109208 فیلتر نتایج به سال:
MANETs are fast emerging as alternate network architecture to infrastructure networks. It is finding many applications and the constraints of processing power, memory, and bandwidth will be soon being overcome with the rapid improvement in the technologies. However the major concern which will remain is the security of the network. MANETs differ largely in the routing mechanism in the network l...
Nowadays, Wireless network becomes unavoidable resource in the modern world. Security of wireless network becomes very important critical research issue in this decade. This paper focused on various kinds of attacks and proposed methodology for authentication. Attacks which may be passive attacks or active attacks will collapse the entire operation of the whole network. The attacks on wireless ...
In this paper we analyze attacks that deny channel access by causing pockets of congestion in mobile networks. Such attacks would essentially prevent one or more nodes from accessing or providing specific services. Here we focus on the properties of the most commonly used routing protocol, the AODV, which enables such attacks. We propose a new routing protocol which we call as BT_AODV protocol ...
Rapid advances in wireless networking technologies have made it possible to construct a Mobile Ad hoc Network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, MANETs are vulnerable to various kinds of attacks which aim at disrupting their routing operations. To develop a strong security scheme to protect against these attacks it is n...
The existing wireless routing protocols do not accommodate any security and are highly vulnerable to attacks. This paper discusses the weakness of those protocols, and threats and attacks against wireless routing. I also look at some suggested solutions that could be used when secure protocols are designed. The current protocols should not be used in hostile environments unless the applications...
We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disruption Denial-of-Service (DoS) attacks. Unlike many existing solutions, TUF does not focus on a particular type of attack, but instead takes an approach that is fundamentally more general. TUF is a cross-layer technique tha...
Mobile ad hoc network is based upon multi-hop communication wherein the nodes themselves act as routers as well as source. The inherent characteristics of a MANET make it vulnerable to a variety of insider as well as outsider attacks. Most of the secure routing protocols do not focus on the insider attacks wherein certain adversarial nodes may launch a number of attacks on the routing protocol ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید