نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

Journal: :CoRR 2010
P. Samundiswary D. Sathian Perumal Dananjayan

Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the network coordinates with every other node in forwarding their packets to reach the destination. Since these nodes operate in a physically insecure environment; they are vulnerable to different types of attacks such as s...

2003
Jiejun Kong Xiaoyan Hong Mario Gerla

In hostile environments, adversaries can launch passive attacks against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to trace network routes and infer the motion pattern of nodes at the end of those routes may pose a serious threat to covert operations. In this paper we propose a feasible adversary model of such attacks, then present seve...

Journal: :CoRR 2010
Ochirkhand Erdene-Ochir Marine Minier Fabrice Valois Apostolos A. Kountouris

This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In th...

2011
A. VANI D. Sreenivasa Rao

The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. However, almost all common routing protocols at present consider performance as first priority, and have little defense capability against the malicious nodes. Many researches have proposed various protocols of high...

2012
Hongjun Liu Xiaofeng Hu Dan Zhao Xicheng Lu

Attacking on inter-domain routing system degrades the availability and performance of Internet severely. It is challenge to defend against the extreme attacks which exhaust the resources of routers by generating a great number of update messages. In this paper, we propose two mechanisms to protect Internet from such attacks: to isolate attacks in local region, unnecessary updates are suppressed...

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

2007
You-Chiun Wang Yu-Chee Tseng

An ad hoc or a sensor network is composed of a collection of wireless nodes. A node can only communicate with other nodes within its limited transmission range. To facilitate communication between two nodes without a direct communication link, routing protocols must be developed to support multi-hop communication. Although many routing protocols have been proposed for ad hoc and sensor networks...

2013
Mary Cherian

In most of the scenarios, communication in Wireless Sensor Network (WSN) takes place via multihop routing. Multihop routing does not provide much protection against identity deception, developed through the replay of routing information. This defect can be exploited by an opponent to launch several harmful attacks or even attacks that destroy the routing protocols, misdirecting the network traf...

Journal: :International Journal of Grid and Distributed Computing 2018

2009
Zdravko Karakehayov

This paper deals with the tradeoffs between security, real-time and lifetime performance. Due to the multihop nature of communication wireless ad hoc networks are very vulnerable to attacks. Malicious nodes included in a routing path may misbehave and organize attacks such as black holes. Scaling the number of hops for a packet delivery we trade off energy efficiency against security and real-t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید