Results 261 to 270 of about 83,142 (315)
Some of the next articles are maybe not open access.

Investigating Packet Dropping Attacks in RPL-DODAG in IoT

2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 2019
The Internet of Things (IoT) facilitates communication among a huge number of uniquely identifiable heterogeneous devices and services without human intervention. To efficiently leverage the benefits of IoT, it is important that IoT applications are secured.
G. Geethakumari   +3 more
openaire   +2 more sources

Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks

2011 IEEE International Conference on Communications (ICC), 2011
Wireless ad hoc networks have great potentials in a broad range of applications. Their inherent vulnerability to various network attacks however limits their wide adaptation and deployment in practice.
Xu Li, R. Lu, Xiaohui Liang, Xuemin Shen
semanticscholar   +1 more source

Reliable Routing against Selective Packet Drop Attack in DSR based MANET

Journal of Software, 2009
A mobile ad hoc network (MANET) is a self-organizing, self-configuring confederation of wireless systems. MANET devices join and leave the network asynchronously at will, and there are no predefined clients or server.
N. Bhalaji, A. Shanmugam
semanticscholar   +1 more source

A trust-based scheme against Packet dropping attacks in MANETs

2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), 2016
Mobile Ad-hoc Network (MANET) is a dynamic network topology in which nodes move without restraint anytime and anywhere; it does not require centralized authorization. Previous researches used traditional cryptographic or authentication function for security.
Rutvij H. Jhaveri, Sachi N. Shah
openaire   +2 more sources

Fellowship: Defense against Flooding and Packet Drop Attacks in MANET

2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 2006
In this paper, we propose an obligation-based model called fellowship to mitigate the flooding and packet drop attacks. We also explain how the fellowship model identifies and penalizes both the malicious and selfish nodes respectively in mobile ad hoc networks (MANET).
Udaya Tupakula   +2 more
openaire   +2 more sources

Enhancing Rpl Resilience Against Packet Dropping Insider Attacks

Qatar Foundation Annual Research Conference Proceedings Volume 2014 Issue 1, 2014
To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability.
Hamid Menouar   +3 more
openaire   +2 more sources

Bounding Packet Dropping and Injection Attacks in Sensor Networks

2007
A malicious insider in a sensor network may sabotage the network at any level of operation. While most prior work on network-layer security has focused on providing control plane integrity (specifically, routing correctness), we approach a complementary and equally important problem: data plane reliability. In a data plane attack, the attacker does not
Zhang, Xin   +3 more
openaire   +1 more source

Analysis of the effect of malicious packet drop attack on packet transmission in wireless mesh networks

2018 Conference on Information Communications Technology and Society (ICTAS), 2018
Wireless mesh networks (WMNs) are known for possessing good attributes such as low up-front cost, easy network maintenance, and reliable service coverage. This has largely made them to be adopted in various environments such as; school campus networks, community networking, pervasive healthcare, office and home automation, emergency rescue operations ...
Victor Oluwatobiloba Adeniji   +1 more
openaire   +2 more sources

Trust‐based secure routing and the prevention of vampire attack in wireless ad hoc sensor network

International Journal of Communication Systems, 2020
The recent development in technologies is the driving force for development in sensors, especially in military applications. Due to the openness nature of the ad hoc sensor network, the system gets easily affected, which may lead to some packet drop ...
Isaac Sajan, And, Jasper
semanticscholar   +1 more source

Packet-Dropping Attack

Encyclopedia of Cryptography and Security, 2011
Qijun Gu
openaire   +2 more sources

Home - About - Disclaimer - Privacy