نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

2016
Anil Saini

MANETs are fast emerging as alternate network architecture to infrastructure networks. It is finding many applications and the constraints of processing power, memory, and bandwidth will be soon being overcome with the rapid improvement in the technologies. However the major concern which will remain is the security of the network. MANETs differ largely in the routing mechanism in the network l...

Journal: :International Journal of Distributed Sensor Networks 2006

Journal: :International Journal of Computer Applications 2011

Journal: :DEStech Transactions on Computer Science and Engineering 2018

2015
D. Srinath V. Subedha S. Venkatraman

Nowadays, Wireless network becomes unavoidable resource in the modern world. Security of wireless network becomes very important critical research issue in this decade. This paper focused on various kinds of attacks and proposed methodology for authentication. Attacks which may be passive attacks or active attacks will collapse the entire operation of the whole network. The attacks on wireless ...

2005
B. MALARKODI

In this paper we analyze attacks that deny channel access by causing pockets of congestion in mobile networks. Such attacks would essentially prevent one or more nodes from accessing or providing specific services. Here we focus on the properties of the most commonly used routing protocol, the AODV, which enables such attacks. We propose a new routing protocol which we call as BT_AODV protocol ...

2006
Bounpadith Kannhavong Hidehisa Nakayama Nei Kato Yoshiaki Nemoto Abbas Jamalipour

Rapid advances in wireless networking technologies have made it possible to construct a Mobile Ad hoc Network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, MANETs are vulnerable to various kinds of attacks which aim at disrupting their routing operations. To develop a strong security scheme to protect against these attacks it is n...

2002
Qifeng Lu

The existing wireless routing protocols do not accommodate any security and are highly vulnerable to attacks. This paper discusses the weakness of those protocols, and threats and attacks against wireless routing. I also look at some suggested solutions that could be used when secure protocols are designed. The current protocols should not be used in hostile environments unless the applications...

2006
Ruiliang Chen Michael Snow Jung-Min Park Mohamed Tamer Refaei Mohamed Eltoweissy

We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disruption Denial-of-Service (DoS) attacks. Unlike many existing solutions, TUF does not focus on a particular type of attack, but instead takes an approach that is fundamentally more general. TUF is a cross-layer technique tha...

2013
Shirina Samreen

Mobile ad hoc network is based upon multi-hop communication wherein the nodes themselves act as routers as well as source. The inherent characteristics of a MANET make it vulnerable to a variety of insider as well as outsider attacks. Most of the secure routing protocols do not focus on the insider attacks wherein certain adversarial nodes may launch a number of attacks on the routing protocol ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید