نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

2011
G. Nakibly F. Templin

This document is concerned with security vulnerabilities in IPv6-inIPv4 automatic tunnels. These vulnerabilities allow an attacker to take advantage of inconsistencies between the IPv4 routing state and the IPv6 routing state. The attack forms a routing loop that can be abused as a vehicle for traffic amplification to facilitate denialof-service (DoS) attacks. The first aim of this document is ...

2012
Ira Nath

Black hole attack is one kind of routing disturbing attacks and can bring great damage to all clusters of a MANET. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, and infrastructure-less property. As a result, an efficient algorithm to detect black hole attack is important. This paper proposes and evaluates strategies ...

2012
Meenakshi Patel Sanjay Sharma

Absence of infrastructure and dynamic nature of MANET invites intruder to launch attack, one of them is flooding. On demand routing such as AODV is more popular then proactive routing use flooding to discover route. Attackers used this concept to launch DoS attack like flooding; black hole and gray hole are the known attack in MANET. In this paper we have proposed a new method based on AODV beh...

Journal: :International Journal of Computer Applications Technology and Research 2017

2010
Manoj Kumar Mishra Binod Kumar Pattanayak Alok Kumar Jagadev Manojranjan Nayak

The major challenge to design and deployment of mobile ad hoc networks (MANETs) is its dynamic nature, which carries with itself a set of security measures to be resolved. In this paper, we compare the behavior of three routing protocols DSDV, DSR and AODV under security attack, where the investigation is carried out with respect to two types of node misbehavior. The parameters taken into consi...

2013
Swarnali Hazra S. K. Setua

In On-demand routing protocols for wireless ad-hoc networks, whenever communication is needed, source discovers route for data delivery to destination. Blackhole attackers exploit the on demand route discovery process and data delivery by dropping the packets which are supposed to be forwarded by them. In this paper, we have proposed an enhanced AODV routing protocol, CAT-AODV-B (Context Aware ...

2009
Chris Lesniewski-Laas Frans Kaashoek M. Frans Kaashoek

Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed hash table that is strongly resistant to the Sybil attack. This is the first solution to this problem with sublinear run time and space usage. The protocol uses the social ...

Journal: :Journal of Information Processing Systems 2010

Journal: :International Journal of Information Technology, Modeling and Computing 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید