Attacks Toward Wireless Network-on-Chip and Countermeasures
نویسندگان
چکیده
منابع مشابه
Wireless Body Area Networks: Attacks and Countermeasures
Wireless Sensor Networks (WSNs) have been identified for their utility in a variety of different fields such as military sensing and tracking, environmental monitoring, patient monitoring and tracking smart environments. Wireless Body Area Network (WBAN) technology is the consequence of the existing WSN technology. These networks are a composition of tiny, inexpensive and low-power biomedical n...
متن کاملA survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملNetwork Coding Security: Attacks and Countermeasures
By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the diff...
متن کاملUsing Game Theory to Classify Wireless Ad Hoc Network Attacks with Analysis on Countermeasures
Game theory has been receiving immense concern to deal with attacks in wireless ad hoc networks, which are widely employed in a large range of applications but vulnerable to various attacks. Previous works provided readers with comprehensive understanding of game theoretic solutions on cyber security problems. However, they neglect the relationship between attack characteristics and the corresp...
متن کاملWormhole Attacks and Countermeasures in Wireless Sensor Networks : A Survey
Wireless sensor networks can be deployed in inhospitable terrains or in hostile environments to provide continuous monitoring and processing capabilities. Due to the wireless and distributed nature, security is very crucial issue in wireless sensor network. Security comes from attacks. Detecting wormhole attack is very hard compared to other attacks because it uses private, out-of-band channel ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Emerging Topics in Computing
سال: 2021
ISSN: 2168-6750,2376-4562
DOI: 10.1109/tetc.2020.2973427