نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

2014
P. Dhivya Sathya Priya

Abstract— This Project work explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. The ―Vampire‖ attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. To mitigate these types of attacks, include a new proof-ofconcept protocol and AO...

Journal: :International Journal for Information Security Research 2014

2012
Suraj Sharma Sunil Kumar Panda Rahul Ramteke Sanjay Kumar Jena

Most of the routing protocols proposed for ad-hoc networks and sensor networks are not designed with security as a goal. Hence, many routing protocols are vulnerable to an attack by an adversary who can disrupt the network or harness valuable information from the network. Routing Protocols for wireless sensor networks are classified into three types depending on their network structure as Flat ...

2010
Sultan Almotiri Irfan Awan

In this paper, we describe a new authentication service and trust level attached in every packet to make the routing in Mobile Ad Hoc Network secure. Efficient operation of Ad Hoc networks is dependent on maintaining appropriate routing information in a distributed fashion. The routing protocol is vulnerable to attacks from malicious nodes. Therefore, our prime focus is on securing the routing ...

2007
Rajendra V. Boppana Xu Su

Route falsification attacks are easy to launch in wireless ad hoc networks with on demand routing protocols that employ network-wide flooding of control packets for route discoveries. Colluding insider malicious nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts in routing paths and influence data traffic to flow through them. The cu...

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

2009
HyoJin Kim Ruy de Oliveira Bharat Bhargava JooSeok Song

Standard on-demand routing protocols in wireless ad hoc networks were not originally designed to deal with security threats. Because of that, malicious users have been finding ways to attack networks. Rushing attacks represent one of such possibilities. In these attacks, malicious nodes forward the Route Request (RREQ) packets, asking for a route, to the destination node quicker than the legiti...

2011
Virendra Singh Kushwah Gaurav Sharma

Mobile Ad-Hoc Network (MANET) is a wireless network without infrastructure. Self-configurability and easy deployment feature of the MANET resulted in numerous applications in this modern era. Efficient routing protocols will make MANETs reliable. The open and dynamic operational environment of MANET makes it vulnerable to various network attacks. A common type of attacks targets at the underlyi...

2015
K. K. Varshney A. Gurjar K. S. Chavda

Ad Hoc On-Demand Distance Vector (AODV) routing protocol is among the efficient routing protocols in Mobile Ad Hoc Network (MANET). Because of its routing features AODV has gained popularity compared to other routing protocols, but this protocol lacks a security features which make it more vulnerable to malicious attack particularly black hole attack. A single or cooperate black hole attacks wh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید