نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

2012
Moutushi Singh Rupayan Das

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc and sensor network is the wormhole attack. It is a particularly severe attack on routing protocols for ad hoc networks in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at t...

Journal: :Intelligent Automation & Soft Computing 2011
Jing-Jing Gui Jinshuang Wang Yu-sen Zhang Tao Zhang

The threat analysis for routing protocol is a significant issue in the ad-hoc network security. In this paper we propose a framework in which the vulnerabilities from the Sybil attack for ad-hoc routing protocol can be modeled in a mathematic approach, and the formal analysis is carried out with a specific proof system under the extended strand space model in order to further verify the validit...

Journal: :JCS 2014
Adnan Ahmed Kamalrulnizam Abu Bakar Muhammad Ibrahim Channa

The security is major challenging issue in wireless sensor network applications because they are operated in public and unrestrained areas which also makes difficult to protect against tampering or captured by an adversary force that can launch insider attacks to make a node compromised. One type of such attack is black hole attack. Existing AODV routing protocol does not have mechanism to defe...

2014
Akansha Agrawal Amit Saxena

The wormhole attack is considered a serious threat to the security in multi-hop ad hoc networks. In wormhole attack, the attacker makes the tunnel from one end to another network, the nodes are in a different place at both ends of the tunnel believe are true neighbours and gets the conversation through the wormhole link . Unlike many other ad hoc routing attacks, worm hole attack cannot be prev...

2003
Steven M. Bellovin Emden R. Gansner

Attacks on the routing system, with the goal of diverting traffic past an enemy-controlled point for purposes of eavesdropping or connection-hijacking, have long been known. In principle, at least, these attacks can be countered by use of appropriate authentication techniques. We demonstrate a new attack, based on link-cutting, that cannot be countered in this fashion. Armed with a topology map...

2011
Chung Il Sun Tae Ho Cho

The wireless sensor networks are subjected to threats and highly vulnerable to various attacks due to the sensor characteristics, such as the openness of wireless communication channels, lack of infrastructure, and physical discloser. Sensor networks are highly susceptible to denial of service (DoS) attacks due to their inherent characteristics. Sinkhole attack is well-known routing attack in w...

2015
Gaurav Gupta

The main Importance of Research paper is to propose a new algorithm for the detection of wormhole Attack in the WSNs. Wormhole Attack is the severe attack on WSN routing protocols. Two malicious nodes create an illusion that they are very close to each other by setting up low latency link(wormhole tunnel), retrieve data packets on one part and transmit it to another part of the network via that...

2017
Yuxin Liu Mianxiong Dong J. Wang Y. Liu Y. Hu M. Dong K. Ota A. Liu H. C. Leligou P. Trakadas S. Maniatis P. Karkazis Z. Zheng L. X. Cai Z. Chen

A Wireless Sensor Network (WSN) comprises of devices that are autonomously distributed in space used to supervise the physical and environmental conditions with the help of sensors. They are mainly used in security critical applications such as monitoring the environment, tracking the surroundings and controlling areas. Security is an important requirement in WSNs. Because of the resource limit...

Journal: :CoRR 2012
Rajib Das Bipul Syam Purkayastha Prodipto Das

A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack. In this paper,...

2015
Tripti Sharma Leenu Singh

Security is one of the most challenging issues in Mobile ad-hoc networks (MANETs). Most of the routing protocols in MANETs do not have an inbuilt mechanism to fight security attacks. Sybil attack is one such attack in which a single physical device takes on multiple identities in network thus behaving as multiple independent devices. With the help of these forged identities, the attacker can dr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید