نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

2016
Devendra Kumar Rupali Bhartiya Priyanka Goyal Sahil Batra Ajit Singh Pradip M. Jawandhiya Mangesh M. Ghonge Indrani Das

Network security is a pathetic link in wired and wireless network systems. A mobile ad hoc network (MANET) is a compilation of self-sufficient nodes that converse with every further by forming a multi-hop radio network and maintaining associations in a decentralized manner. Security remains a main challenge for these networks owing to their features of open medium, animatedly changing topologie...

2016
S. Rakesh Kumar N. Gayathri T. Manikandan

Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANETs). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black h...

2012
T. Krishna Rao Mayank Sharma M. V. Vijaya Saradhi

In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbour relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits th...

Journal: :CoRR 2012
Bipul Syam Purkayastha Rajib Das

-------------------------------------------------------------------ABSTRACT-------------------------------------------------------------In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as bl...

Journal: :CoRR 2012
Robert Lychev Sharon Goldberg Michael Schapira

The Border Gateway Protocol (BGP) sets up routes between the smaller networks that make up the Internet. Despite its crucial role, BGP is notoriously vulnerable to serious problems, including (1) propagation of bogus routing information due to attacks or misconfigurations, and (2) network instabilities in the form of persistent routing oscillations. The conditions required to avoid BGP instabil...

2013
Rahul Sharma Naveen Dahiya Divya Upadhyay

Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. MANETs are vulnerable to various attacks; black hole is one of the possible attacks. Black hole is a type of routing attack where a malicious node advertise itself as having the shortest path to all nodes in the environment by sending fake route reply. We attempt to focus on a...

2011
A. VANI D. Sreenivasa Rao

The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. However, almost all common routing protocols at present consider performance as first priority, and have little defense capability against the malicious nodes. Many researches have proposed various protocols of high...

2015
C. Siva S. Arumugam

Prefix-hijacking attack offers malicious parties to gain access to untraceable IP addresses in Intenet. Border gateway protocol (BGP) is the dominant inter domain routing protocol used in Internet. In this paper, to defend against Prefix Hijacking Attack on border gateway protocol (BGP), we propose to design a route reliability ranking (RRR) algorithm. The algorithm is used to authenticate the ...

2014
Akanksha Gupta Anuj K. Gupta

Wireless Sensor Networks refers to a multi-hop packet based network that contains a set of mobile sensor nodes. Every node is free to travel separately on any route and can modify its links to other nodes. Therefore, the network is self organizing and adaptive networks which repeatedly changes its topology. The relations among nodes are restricted to their communication range, and teamwork with...

2007
Ioannis Krontiris Tassos Dimitriou Thanassis Giannetsos Marios Mpasoukos

In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by presenting how it can be launched in realistic networks that use the MintRoute protocol of TinyOS. MintRoute is the most widely used routing protoc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید