نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

Journal: :CoRR 2009
Marianne Azer Sherif El-Kassas Magdy S. El-Soudani

In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing protocols, it is called the wormhole attack. We can think of wormhole attack as a two phase process launched by one or several malicious nodes. In the first phase, these malicious nodes, called wormhole nodes, try to lure legitimate nodes to send data to other nodes via them. In the...

Journal: :I. J. Network Security 2009
Mohamed Salah Bouassida Gilles Guette Mohamed Shawky Bertrand Ducourthial

A Vehicular Ad hoc Network is a collection of mobile hosts forming a temporary network without the aid of any established infrastructure. This flexibility in space and time induces new challenges towards the security needed to support secure communications. Indeed, VANET are subject to attacks due to their vulnerabilities; one of the most compromising attacks is the Sybil nodes attack. We prese...

2011
E. Poornima Shoba Bindhu

As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly suscep...

2015
Shraddha S. Mahajan

As Mobile Ad-hoc Network (MANET) doesn’t require pre-existing infrastructure, thus every node is active in data transmission and reception. In MANET various attacks are created by unauthorized transmitter in the network, which may affects on the performance of the network. Wormhole attack is created by collaborative attackers. So confrontation is take place between discoveries and dislodges thi...

2013
Harshita Pal Komal Punia

Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol). Blackhole and Wormhole nodes are malicious nodes which degr...

2011
Jung Ki So Douglas S. Reeves

BitTorrent and its derivatives contribute a major portion of Internet traffic due to their simple and scalable operation. However, the lack of security mechanisms makes them vulnerable to attacks such as file piece pollution, connection slot consumption, and bandwidth exhaustion. These effects are made worse by the ability of attackers to manufacture new identities, or Sybil nodes, at will. The...

2012
Prateek Mittal Matthew Caesar Nikita Borisov

Distributed hash tables suffer from several security and privacy vulnerabilities, including the problem of Sybil attacks. Existing social network-based solutions to mitigate the Sybil attacks in DHT routing have a high state requirement and do not provide an adequate level of privacy. For instance, such techniques require a user to reveal their social network contacts. We design X-Vine, a prote...

2013
Heena Sharma Awan Dhawan

Wireless sensor networks are used for many different applications these days such as in environment applications, military applications, queue tracking, etc. In today’s scenario, security in WSN is one of the major issue.WSN are vulnerable to different types of attacks due to various constraints such as low battery power, less memory, and associated low energy. These attacks lead to decrease in...

2008
Le Xuan Hung Ngo Trong Canh Sungyoung Lee Young-Koo Lee Heejo Lee

For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, stu...

2015
Mohammad Nurul Afsar Shaon

This paper presents an innovative wormhole detection scheme an using artificial neural network for wireless sensor networks (WSNs). Most detection schemes described in the literature are designed for uniformly distributed sensors in a network, using statistical and topological information and special hardware. However, these schemes may perform poorly in non-uniformly distributed networks. Acco...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید