نتایج جستجو برای: wormhole and sybil attacks
تعداد نتایج: 16832654 فیلتر نتایج به سال:
Abstract— A Sybil attacker is a malicious node which creates several false identities to itself. This attack is extremely harmfull to any voting or cooperation-based system, like a MANET. MANETs (Mobile Ad hoc Networks) are dynamically establiched, cooperation-based wireless networks, deployed without any infrastructure or centralized administration. Due to their dynamic environment, MANETs are...
The open nature of wireless communication channels, lack of infrastructure and fast deployment practices make vulnerable to wide range of routing attacks. One of the most popular attacks is wormhole attack. The transmission time based detection of wormhole attack is proposed and is simulated in Network simulator (ns-2). The detection accuracy of the network is analyzed. The proposed method does...
Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the network are referred to as Byzantine attacks. Traditional secure routing protocols are vulnerable to this class of attacks since they usually assume that once authenticated, a node can be trusted to execute the protocol correctly. We present a detailed description of several By...
Vehicular ad hoc networks (VANET) are a class of ad hoc networks build to ensure the safety of traffic. Trust and security remain a major concern in VANET since a simple mistake can have catastrophic consequence. A crucial point in VANET is how to trust the information transmitted when the neighbouring vehicles are rapidly changing and moving in and out of range. The main aim of this paper is t...
Wireless Sensor Network platforms are less expensive and more powerful having tiny electronic devices called Motes (sensor nodes). Wireless sensor networks enhance its popularity in military and health centric research areas; now it is also popular in industrial area. This paper describes the security requirements as WSNs are easily prone to more attacks than wired networks. This paper studies ...
Wireless sensor network is a field which is spreading its wings into different application areas. Security is the primary concern as these nodes are deployed in unattended and harsh environment. Authentication and integrity of data becomes essential to monitor the network installed in remote areas. This paper generates group keys for every session to encrypt data. The technique minimizes 5.5% o...
This paper proposes and evaluates a decentralized self-healing mechanism that detects and recovers from wormhole attacks in wireless multi-hop sensor networks. Upon detecting a wormhole attack, the proposed mechanism, called SWAT, identifies the locations of malicious nodes (or wormhole nodes), isolates them from the network and recovers the routing structure distorted by them. SWAT is the firs...
Security emerges as a central requirementas mobile ad hoc network applications are deployed. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. It is possible even if the attacker has no...
Security is a condemnatory situation in the network at the instant of transference. Miscellaneous grouping of attacks become visible in the network. In this paper we will examine about Sybil Attack. The proposed technique is the major idealization of our effort to provide elevated security to the network from Sybil attack using timestamp approach. Our proposed effort focused to diminish the iss...
Real-time crowdsourced maps such as Waze provide timely updates on traffic, congestion, accidents and points of interest. In this paper, we demonstrate how lack of strong location authentication allows creation of software-based Sybil devices that expose crowdsourced map systems to a variety of security and privacy attacks. Our experiments show that a single Sybil device with limited resources ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید