A Light Weight Solution for Detecting De-Authentication Attack
نویسندگان
چکیده
منابع مشابه
A Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملA Light Weight Trust Based Authentication Mechanism to Thwart Black Hole Attack in Manet
Providing secure routing in MANET environment is a difficult task due to its distinct nature. In MANET, routing protocols are designed to cope with the network operations but in nature they are affecting by both internal and external attacks. Black hole attack is one kind of internal attack that affects routing operation by retaining all incoming packets. This type of attack is very hard to pre...
متن کاملEfficient Passive Full-disclosure Attack on RFID Light- weight Authentication Protocols LMAP++ and SUAP
Radio Frequency Identification (RFID) is a technology that has been widely used in daily life, such as in access control, in electronic passports, in payment and ticketing. However, since the RFID information may be easily unveiled over the air, security and the privacy issues always exist. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nev...
متن کاملNew Findings on Rfid Authentication Schemes against De-synchronization Attack
In order to protect privacy of RFID tag against malicious tag tracing activities, most RFID authentication protocols support forward/backward security properties by updating the same secret values held at both tag end and database end asynchronously during each authentication session. However, in real network environments an adversary may easily interrupt or interfere transmission of necessary ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Network Security & Its Applications
سال: 2019
ISSN: 0975-2307,0974-9330
DOI: 10.5121/ijnsa.2019.11102