نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

2014
Renan Fischer Luiz Carlos Pessoa Albini

Abstract— A Sybil attacker is a malicious node which creates several false identities to itself. This attack is extremely harmfull to any voting or cooperation-based system, like a MANET. MANETs (Mobile Ad hoc Networks) are dynamically establiched, cooperation-based wireless networks, deployed without any infrastructure or centralized administration. Due to their dynamic environment, MANETs are...

2012
S. Sharmila G. Umamaheswari David Wagner Y. Hu A. Perring D. B. Johnson Majid Khabbazian Vijay K Bhargava Zhibin Zhao Bo Wei Xiaomei Dong Lan Yao Fuxiang Gao Dezun Dong Mo Li Yunhao Liu Xiang-Yang Li Xiangke Liao

The open nature of wireless communication channels, lack of infrastructure and fast deployment practices make vulnerable to wide range of routing attacks. One of the most popular attacks is wormhole attack. The transmission time based detection of wormhole attack is proposed and is simulated in Network simulator (ns-2). The detection accuracy of the network is analyzed. The proposed method does...

2004
Baruch Awerbuch Reza Curtmola David Holmer Cristina Nita-Rotaru Herbert Rubens

Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the network are referred to as Byzantine attacks. Traditional secure routing protocols are vulnerable to this class of attacks since they usually assume that once authenticated, a node can be trusted to execute the protocol correctly. We present a detailed description of several By...

2014
Shivani Kanwar Sandeep Joshi Manu Sood

Vehicular ad hoc networks (VANET) are a class of ad hoc networks build to ensure the safety of traffic. Trust and security remain a major concern in VANET since a simple mistake can have catastrophic consequence. A crucial point in VANET is how to trust the information transmitted when the neighbouring vehicles are rapidly changing and moving in and out of range. The main aim of this paper is t...

2013
Manisha Gaurav Gupta

Wireless Sensor Network platforms are less expensive and more powerful having tiny electronic devices called Motes (sensor nodes). Wireless sensor networks enhance its popularity in military and health centric research areas; now it is also popular in industrial area. This paper describes the security requirements as WSNs are easily prone to more attacks than wired networks. This paper studies ...

2014
G. T. Raju William R. Claycomb Dongwan Shin Elaine Shi Dawn Song Yih-Chun Hu Zhibin Zhao Bo Wei Xiaomei Dong Lan Yao Fuxiang Gao Liping Teng Yongping Zhang Changlong Chen

Wireless sensor network is a field which is spreading its wings into different application areas. Security is the primary concern as these nodes are deployed in unattended and harsh environment. Authentication and integrity of data becomes essential to monitor the network installed in remote areas. This paper generates group keys for every session to encrypt data. The technique minimizes 5.5% o...

2008
Chonho Lee Junichi Suzuki J. Suzuki

This paper proposes and evaluates a decentralized self-healing mechanism that detects and recovers from wormhole attacks in wireless multi-hop sensor networks. Upon detecting a wormhole attack, the proposed mechanism, called SWAT, identifies the locations of malicious nodes (or wormhole nodes), isolates them from the network and recovers the routing structure distorted by them. SWAT is the firs...

2013
Bintu Kadhiwala Harsh Shah

Security emerges as a central requirementas mobile ad hoc network applications are deployed. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. It is possible even if the attacker has no...

2017
Shikha Sharma Shivani Sharma

Security is a condemnatory situation in the network at the instant of transference. Miscellaneous grouping of attacks become visible in the network. In this paper we will examine about Sybil Attack. The proposed technique is the major idealization of our effort to provide elevated security to the network from Sybil attack using timestamp approach. Our proposed effort focused to diminish the iss...

Journal: :CoRR 2014
Gang Wang Bolun Wang Tianyi Wang Ana Nika Bingzhe Liu Haitao Zheng Ben Y. Zhao

Real-time crowdsourced maps such as Waze provide timely updates on traffic, congestion, accidents and points of interest. In this paper, we demonstrate how lack of strong location authentication allows creation of software-based Sybil devices that expose crowdsourced map systems to a variety of security and privacy attacks. Our experiments show that a single Sybil device with limited resources ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید