An Experimental Study of IoT Networks Under Internal Routing Attack
نویسندگان
چکیده
منابع مشابه
Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack
Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...
متن کاملAn Experimental Study of Internal Control Judgments
The work of independent auditors involves two basic activities—evidence collection and evidence evaluation. Substantial agreement exists concerning the types of evidence that should be collected in particular situations and the appropriate collection techniques. The evidence-evaluation activity, however, is less susceptible to codification. As a result, the auditing profession relies heavily up...
متن کاملAn Experimental Study of Asymmetric Routing
Traditionally, most routing protocol designs and their implementations assume that every link is bi-directional. This assumption is no longer true with direct broadcast satellite and other one-way communication link technology. In this research, we study the problems of dynamic asymmetric routing in an experimental approach. We have developed and implemented a method to adapt existing routing p...
متن کاملRobustness of interdependent networks under targeted attack
When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack ...
متن کاملQueueing Analysis for Networks Under DoS Attack
In this paper, we consider a queueing model of computer network under DoS attacks. The arrival of SYN packets contains two types: the regular request packets and the attack packets that request for connections. We assume that the connection requests arrive according to a Poisson processes and the service times are general but different for the two types of requests. A maximum number of connecti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of Computer Networks & Communications
سال: 2020
ISSN: 0975-2293
DOI: 10.5121/ijcnc.2020.12406