نتایج جستجو برای: wormhole attack

تعداد نتایج: 82627  

Journal: :International Journal of Computer Applications 2013

Journal: :JISR on Computing 2022

Wireless Body Area Network (WBAN) is a promising technology that having significant number of applications in healthcare. Despite several benefits, WBAN susceptible to security attacks, particularly related the node misbehavior attacks such as sinkhole, wormhole, blackhole, and grayhole attacks. In this research work, performance AODV protocol against wormhole sinkhole has been analyzed. This c...

2008
Richard Gopaul Peter Kruus Dan Sterne Brian Rivera

In-band wormhole attacks undermine routing by attracting network traffic that otherwise may have bypassed the attackers via alternate, lower-cost routes. The result gives the attackers control over the attracted traffic, allowing them to modify, delay, redirect, eavesdrop, or drop the traffic. In this paper we expand upon the gravitational analysis technique, first presented in [KSG06], for eva...

Journal: :International Journal of Computer Applications 2015

2016
P. Deivendran

Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. We first propose a centralized algorithm to detect wormholes and show its correctness rigorously. Fo...

2013
Huaiyu Wen Guangchun Luo

Wireless Mesh Networks (WMNs) are widely used in many areas, such as industrial, commercial and public-safety environments. However, due to the open nature of wireless communication, it is relatively easy for an adversary to launch serious wormhole attack which can’t be even prevented by cryptographic protocols. To enhance the efficiency and facility of wormhole detection, we here propose a hig...

2014
Kuldeep Singh Sudesh Rani Satyanarayana Vuppala

Mobile Ad-hoc Network (MANET) is a self-configuring wireless network of movable and independent nodes which operate without the support of any permanent infrastructure, hence MANET has dynamic topology. In MANET, each node forwards traffic unrelated to its own use. Despite the proliferation of MANET, it is prone to various attacks which include blackhole attack, grayhole attack, flooding attack...

2017
Harsimran Kaur Kamaljeet Mangat

Mobile ad hoc networks are widely used networks in the present times. The nodes in such network consist of laptops, mobile phones etc. These devices often have very important information in them. Security of these networks is very vital. These networks are prone to various kinds of attacks such as black hole attack, wormhole attack, DDoS attack etc. Out of many other attacks possible, black hol...

2012
Akshita Rana Deepak Shrivastava

A wireless mesh network can be seen as a special type of wireless ad-hoc network. A wireless mesh network often has a more planned configuration, and may be deployed to provide dynamic and cost effective connectivity over a certain geographic area Wireless mesh networks often consist of mesh clients, mesh routers and gateways. In wireless mesh network security of network is one of most concerne...

2011
S. Vijayalakshmi S. Albert Rabara

Mobile Adhoc Network (MANET) with its unique and special characteristics is prone to a host of security threats from within and outside the network. The MANET architecture is well suited for conducting multicast communications as this greatly reduces the number of multicast packets traversing the network. The replication of multicast packets by the intermediate downstream multicast router is de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید