نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

2009
Gergely Ács

Routing is a fundamental networking function in every communication system, and multihop wireless networks are no exceptions. Attacking the routing service, an adversary can easily paralyse the operation of an entire network. Compared to traditional wired networks, such attacks can be performed relatively easily in wireless networks due to the unsupervised access to the wireless medium. The mal...

2012
Ansgar Kellner

In the near future, Wireless Sensor Networks (WSNs) are expected to play an important role for sensing applications, in the civilian as well as in the military sector. WSNs are autonomous, distributed, self-organised networks consisting of multiple sensor nodes. Usually, the limited radio range of the nodes, arising from energy constrains, is overcome by the cooperation of nodes. As the Combina...

2013
P. Narendra Reddy CH. Vishnuvardhan V. Ramesh

Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. These nodes communicate with each other by exchange of packets, which for those nodes not in wireless range goes hop by hop. Unique characteristics, such as dynamic network topology, limited bandwidth, and limited power, nodes ru...

Journal: :J. Network and Computer Applications 2007
Lijun Qian Ning Song Xiangfang Li

Various routing attacks for single-path routing have been identified for wireless ad hoc networks and the corresponding counter measures have been proposed in the literature. However, the effects of routing attacks on multi-path routing have not been addressed. In this paper, the performance of multi-path routing under wormhole attack is studied in detail. The results show that multi-path routi...

Journal: :IEICE Transactions 2009
Le Xuan Hung Sungyoung Lee Young-Koo Lee Heejo Lee

For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that ...

2013
Jing Dong Brett Bavar Cristina Nita-Rotaru

Virtual coordinate system (VCS) based routing provides a practical, efficient and scalable means for point-to-point routing in wireless sensor networks. Several VCS-based routing protocols have been proposed in the last few years, all assuming that nodes are cooperative. However, malicious nodes may violate this assumption, making VCS-based routing protocols vulnerable to numerous attacks. Thus...

2011
Rayala Upendar Rao Madarapu Naresh Kumar K Palanivel

wireless sensors having limited capabilities, because of these factors sensors possess huge attacks like sinkhole, worm hole, Sybil, flooding, etc. a lot of research work already done, but no one implemented secure routing protocol to mitigate all these attacks. Some proposals came on security of wireless sensor network which controlled only one or two attacks. We proposed Secure Routing in Clu...

2005
Scott Huang David MacCallum Mohammad O. Pervaiz Mihaela Cardei Jie Wu

4 Security Attacks on Routing Protocols in Ad Hoc Wireless Networks 11 4.1 Attacks using Impersonation . . . . . . . . . . . . . . . . . . . . . . 12 4.2 Attacks using Modification . . . . . . . . . . . . . . . . . . . . . . . 13 4.3 Attacks using Fabrication . . . . . . . . . . . . . . . . . . . . . . . . 14 4.4 Replay Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4.5 ...

2010
P. SAMUNDISWARY P. DANANJAYAN

-Sensor networks consist of large number of nodes with limited energy, computation and transmission power. Each node in the network helps every other node by forwarding their packets to reach the destination .Since these nodes operate in a physically insecure environment; they are vulnerable to different types of attacks such as sinkhole and wormhole. These attacks can inject malicious packets ...

2010
JASPAL KUMAR DAYA GUPTA

Mobile Ad hoc wireless networks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers. The nodes in MANET are subject to various attacks that range from naïve eavesdropping to vicious battery draining attacks. Routing Protocols, data, bandwidth and battery power are the common target of theses attacks. This pap...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید