Towards Mitigating Jellyfish Attacks Based on Honesty Metrics in V2X Autonomous Networks
نویسندگان
چکیده
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such as their highly dynamic topology frequent connectivity disruptions. Jellyfish attacks a sort denial service attack that challenging deal with, since they conform protocol norms while impairing network performance, particularly in terms communication overhead reliability. Numerous existing approaches have developed new techniques with which identify prevent these attacks; however, no approach has been capable facing all three types attacks, include reordering delay variance periodic drop attacks. this work, we design analyzes behavior every node selects trusted routes for data transmission intended destination by calculating different Honesty metrics. The OMNET++ simulator was used evaluate overall performance proposed protocol. Various evaluation metrics, packet delivery ratio, end-to-end delay, throughput, considered compared other approaches.
منابع مشابه
Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network
As we are living in the digital age, information technology appears in nearly every aspect of our daily lives, and plays an integral role in agriculture, industry, education, business, politics, etc. Thanks to its undeniable convenience, information technology has helped to make our lives easier and more comfortable. For instance, VoIP (voice over IP) provides a cheaper and sm0other experience ...
متن کاملMitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks
A mobile ad hoc network is set up with a group of mobile wireless nodes without the use of any dedicated routers or base stations. Each node acts as an end node as well as a router for other nodes. There are generally two types of ad hoc routing protocols, reactive and proactive routing protocols. The focus of this paper centers on reactive routing protocols which establish routes between commu...
متن کاملMitigating Byzantine Attacks in Ad Hoc Wireless Networks
Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the network are referred to as Byzantine attacks. Traditional secure routing protocols are vulnerable to this class of attacks since they usually assume that once authenticated, a node can be trusted to execute the protocol correctly. We present a detailed description of several By...
متن کاملTowards Measuring and Mitigating Social Engineering Software Download Attacks
Most modern malware infections happen through the browser, typically as the result of a drive-by or social engineering attack. While there have been numerous studies on measuring and defending against drive-by downloads, little attention has been dedicated to studying social engineering attacks. In this paper, we present the first systematic study of web-based social engineering (SE) attacks th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13074591