نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

2013
Ashish Joshi Ram Shringar Raw Prakash Rao Ragiri

Vehicular Ad-hoc Networks (VANETs) are highly dynamic network and prone to many kinds of attacks. One class of attacks known as routing misbehavior targets the routing process of the networks. Grayhole attack is a malicious change in the routing process of effected nodes. Such node takes part in routing process but drops the packet when it is required to forward the packet to other nodes. This ...

Journal: :International Journal of Computer Applications 2016

Journal: :Procedia Computer Science 2016

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

Journal: :DEStech Transactions on Materials Science and Engineering 2017

2006
Lei Guang Chadi Assi Abderrahim Benslimane

In this paper, we demonstrate a new class of protocol-compliant exploits that initiates at the MAC layer but targets ad hoc on-demand routing mechanisms. A misbehaved node implementing this type of attacks completely follows the specifications of IEEE802.11 standard and the existing on-demand routing protocols. However, it can cause routing shortcut attacks or detour attacks. We detail the expl...

2015
K. K. Varshney A. Gurjar K. S. Chavda

Ad Hoc On-Demand Distance Vector (AODV) routing protocol is among the efficient routing protocols in Mobile Ad Hoc Network (MANET). Because of its routing features AODV has gained popularity compared to other routing protocols, but this protocol lacks a security features which make it more vulnerable to malicious attack particularly black hole attack. A single or cooperate black hole attacks wh...

2015
Mingwei Zhang

Routing is a key component for building an interconnected network architecture. There are interdomain and intra-domain routing protocols. The interdomain routing protocol has experienced increasingly frequent anomalies, such as IP prefix hijackings, route leaks, or impact from large-scale disruptive routing events. The intra-domain routing also suffers from various attacks originated from withi...

2003
Anirban Chakrabarti G. Manimaran

The routing table poisoning attack is one of the most devastating and least researched topic among Internet attacks, which needs immediate research attention. In this paper, we develop a scalable method for detecting router attacks and locating the malicious routers (within a small bounded set of nodes) in link state routing protocols. We carry out analytical and simulation studies to evaluate ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید