نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

Journal: :J. Network and Computer Applications 2007
Lijun Qian Ning Song Xiangfang Li

Various routing attacks for single-path routing have been identified for wireless ad hoc networks and the corresponding counter measures have been proposed in the literature. However, the effects of routing attacks on multi-path routing have not been addressed. In this paper, the performance of multi-path routing under wormhole attack is studied in detail. The results show that multi-path routi...

Journal: :IJDSN 2013
Dong-uk Kim Hyo-Won Kim Gisung Kim Sehun Kim

In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) ...

Journal: :J. Network and Computer Applications 2013
Shams Qazi Raad Raad Yi Mu Willy Susilo

A wormhole attack is one of the hardest problems to detect whereas it can be easily implanted in any type of wireless ad hoc network. A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes. Most existing solutions either require special hardware devices or make strong assumptions in order to detect wormhole attacks w...

2013
Mojtaba GhanaatPisheh Sanaei Ismail Fauzi Isnin Majid Bakhtiari

Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they ...

2016

Wireless Sensor Networks are a Collection of Sensor nodes.Wireless sensor network become so much popular in many fields due to its functionality i.e military, industrial area etc.Security is the important and critical issue in the Wireless networks due to the operating nature of WSNs. This Paper describe the security requirements as WSNs are easily prone more attacks than wired networks. This p...

2010
Neal Lathia Stephen Hailes Licia Capra

Recommender systems are vulnerable to attack: malicious users may deploy a set of sybils to inject ratings in order to damage or modify the output of Collaborative Filtering (CF) algorithms. To protect against these attacks, previous work focuses on designing sybil profile classification algorithms, whose aim is to find and isolate sybils. These methods, however, assume that the full sybil prof...

2015
Neha Roy

In Vehicular Ad hoc Networks (VANETs), vehicles periodically broadcast messages for every 100 to 300 milli seconds. Such messages are used to report a safety or non-safety application. Authentication on such safety messages assures the end users in the network. However, a malicious vehicle can trace the messages and can launch varied types of malicious activity which leads to the compromise of ...

2010
Nguyen Tran

Cooperative systems are ubiquitous nowadays. In a cooperative system, end users contribute resource to run the service instead of only receiving the service passively from the system. For example, users upload and comment pictures and videos on Flicker and YouTube, users submit and vote on news articles on Digg. As another example, users in BitTorrent contribute bandwidth and storage to help ea...

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

Vehicular Ad Hoc Networks (VANETs) have the potential to enable next-generation Intelligent Transportation Systems (ITS). In ITS, data contributed by vehicles can build a spatio-temporal view of traffic statistics, which improve road safety and reduce slow jams. To preserve drivers’ privacy, should use multiple pseudonyms instead only one identity. However, may exploit this abundance lau...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید