Results 261 to 270 of about 83,142 (315)
Some of the next articles are maybe not open access.
Investigating Packet Dropping Attacks in RPL-DODAG in IoT
2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 2019The Internet of Things (IoT) facilitates communication among a huge number of uniquely identifiable heterogeneous devices and services without human intervention. To efficiently leverage the benefits of IoT, it is important that IoT applications are secured.
G. Geethakumari+3 more
openaire +2 more sources
Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks
2011 IEEE International Conference on Communications (ICC), 2011Wireless ad hoc networks have great potentials in a broad range of applications. Their inherent vulnerability to various network attacks however limits their wide adaptation and deployment in practice.
Xu Li, R. Lu, Xiaohui Liang, Xuemin Shen
semanticscholar +1 more source
Reliable Routing against Selective Packet Drop Attack in DSR based MANET
Journal of Software, 2009A mobile ad hoc network (MANET) is a self-organizing, self-configuring confederation of wireless systems. MANET devices join and leave the network asynchronously at will, and there are no predefined clients or server.
N. Bhalaji, A. Shanmugam
semanticscholar +1 more source
A trust-based scheme against Packet dropping attacks in MANETs
2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), 2016Mobile Ad-hoc Network (MANET) is a dynamic network topology in which nodes move without restraint anytime and anywhere; it does not require centralized authorization. Previous researches used traditional cryptographic or authentication function for security.
Rutvij H. Jhaveri, Sachi N. Shah
openaire +2 more sources
Fellowship: Defense against Flooding and Packet Drop Attacks in MANET
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 2006In this paper, we propose an obligation-based model called fellowship to mitigate the flooding and packet drop attacks. We also explain how the fellowship model identifies and penalizes both the malicious and selfish nodes respectively in mobile ad hoc networks (MANET).
Udaya Tupakula+2 more
openaire +2 more sources
Enhancing Rpl Resilience Against Packet Dropping Insider Attacks
Qatar Foundation Annual Research Conference Proceedings Volume 2014 Issue 1, 2014To gather and transmit data, low cost wireless devices are often deployed in open, unattended and possibly hostile environment making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and risks related to security and reliability.
Hamid Menouar+3 more
openaire +2 more sources
Bounding Packet Dropping and Injection Attacks in Sensor Networks
2007A malicious insider in a sensor network may sabotage the network at any level of operation. While most prior work on network-layer security has focused on providing control plane integrity (specifically, routing correctness), we approach a complementary and equally important problem: data plane reliability. In a data plane attack, the attacker does not
Zhang, Xin+3 more
openaire +1 more source
2018 Conference on Information Communications Technology and Society (ICTAS), 2018
Wireless mesh networks (WMNs) are known for possessing good attributes such as low up-front cost, easy network maintenance, and reliable service coverage. This has largely made them to be adopted in various environments such as; school campus networks, community networking, pervasive healthcare, office and home automation, emergency rescue operations ...
Victor Oluwatobiloba Adeniji+1 more
openaire +2 more sources
Wireless mesh networks (WMNs) are known for possessing good attributes such as low up-front cost, easy network maintenance, and reliable service coverage. This has largely made them to be adopted in various environments such as; school campus networks, community networking, pervasive healthcare, office and home automation, emergency rescue operations ...
Victor Oluwatobiloba Adeniji+1 more
openaire +2 more sources
Trustābased secure routing and the prevention of vampire attack in wireless ad hoc sensor network
International Journal of Communication Systems, 2020The recent development in technologies is the driving force for development in sensors, especially in military applications. Due to the openness nature of the ad hoc sensor network, the system gets easily affected, which may lead to some packet drop ...
Isaac Sajan, And, Jasper
semanticscholar +1 more source