نتایج جستجو برای: wormhole attack

تعداد نتایج: 82627  

2017
Manish Patel Akshai Aggarwal Nirbhay Chaubey

Wireless sensor networks can be deployed in inhospitable terrains or in hostile environments to provide continuous monitoring and processing capabilities. Due to the wireless and distributed nature, security is very crucial issue in wireless sensor network. Security comes from attacks. Detecting wormhole attack is very hard compared to other attacks because it uses private, out-of-band channel ...

2013
Nagendra Kumar Shubham Omar Sandeep Saxena

The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. There is no central control authority in ad-hoc network. Because of some flaws of ad-hoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired networ...

Journal: :CoRR 2009
Debdutta Barman Roy Rituparna Chaki Nabendu Chaki

In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is ...

2011
Sana ul Haq Faisal B Hussain

Mobile Ad hoc Networks (MANETs) are prone to a variety of attacks due to their unique characteristics such as dynamic topology, open wireless medium, absence of infrastructure, multi hop nature and resource constraints. Any node in mobile ad hoc networks operates not only as end terminal but both as an intermediate router and client. In this way, multi-hop communication occurs in MANETs and thu...

2003
Yih-Chun Hu Adrian Perrig David B. Johnson

As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wo...

2001
Yih-Chun Hu Adrian Perrig David B. Johnson

As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wo...

2015
Xiaoying Yang Qixiang Song

As DV-Hop algorithm estimates distance by distance vector exchanging, positioning process is vulnerable to devastate wormhole attacking. An improved DV-Hop algorithm (AWADV-Hop) which resists wormhole attack is proposed, based on the original algorithm in this paper. To solve the problem that hops and the average distance per hop is the most vulnerable to wormhole attack in DV-Hop. This paper f...

2014
RAJ SHREE R. A. KHAN

In multi hop wireless systems, such as wireless sensor networks, mobile ad hoc network, security is an important factor. It becomes more critical issue when we transmit important data between nodes. There are a lot of attacks available in wireless sensor network or mobile ad hoc network. In our paper we are going to discuss about a particularly devastating attack, known as the wormhole attack. ...

2015
Mehdi Sookhak Adnan Akhundzada Alireza Sookhak Mohammadreza Eslaminejad Abdullah Gani Muhammad Khurram Khan Xiong Li Xiaomin Wang

Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though,...

Journal: :EURASIP J. Wireless Comm. and Networking 2010
Honglong Chen Wei Lou Xice Sun Zhi Wang

Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید