Security of electrostatic field persistent routing: Attacks and defense mechanisms

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security of Electrostatic Field Persistent Routing: Taxonomy of Attacks and Defense Mechanisms

g (EFR) is a form of geographical multirkload-balancing problem. However, it assumes that the -based routing protocols can be subject to various attacks. -based routing protocols. More -Pole Field Persistent Routing -effort, they can be highly destructive to s workload balanced operation. We present extensive

متن کامل

Internet Worms: Threats, Attacks and Defense Mechanisms

............................................................................................................................. ii

متن کامل

gore: Routing-Assisted Defense Against DDoS Attacks

We present gore, a routing-assisted defense architecture against distributed denial of service (DDoS) attacks that provides guaranteed levels of access to a network under attack. Our approach uses routing to redirect all traffic destined to a customer under attack to strategically-located gore proxies, where servers filter out attack traffic and forward authorized traffic toward its intended de...

متن کامل

Mechanisms of Internet Security Attacks

Internet security attack could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's most secure systems’ browsers, including Netscape Navigator and Microsoft Internet Explorer. There are too many types, methods and mechanisms of attack where new attack techniques and exploits are constantly being developed and discovered. In this...

متن کامل

Security Attacks and Defensive Measures For Routing

Indispensable feature of MANETs is security. MANET is a sort of wireless network communications that can construct itself on the run. One of the significant properties of MANET is dynamic organization. To lodge the varying topology and to provide security, well defined routing algorithms are needed. No protocols detain all the security attacks and provide strategies to prevent them. A network l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ad Hoc Networks

سال: 2016

ISSN: 1570-8705

DOI: 10.1016/j.adhoc.2015.07.016