Mobile small cell technology is considered as a 5G enabling technology for delivering ubiquitous 5G services in a cost-effective and energy efficient manner.
Reza Parsamehr+3 more
doaj +1 more source
Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy [PDF]
IoT Servers that receive and process packets from IoT devices should meet the QoS needs of incoming packets, and support Attack Detection software that analyzes the incoming traffic to identify and discard packets that may be part of a Cyberattack. Since UDP Flood Attacks can overwhelm IoT Servers by creating congestion that paralyzes their operation ...
arxiv
An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks [PDF]
MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for ...
arxiv +1 more source
EAODV: A*-BASED ENHANCEMENT AD-HOC ON DEMAND VECTOR PROTOCOL TO PREVENT BLACK HOLE ATTACKS
Black hole attack is an attack where a node that responds to RREQ from the source node by replying a fake freshness information and false hop count. The black hole nodes do not respond to distributed co-operation in routing protocol to absorb all the ...
Khalil I Ghathwan+2 more
doaj +1 more source
Distributed fusion filter over lossy wireless sensor networks with the presence of non-Gaussian noise [PDF]
The information transmission between nodes in a wireless sensor networks (WSNs) often causes packet loss due to denial-of-service (DoS) attack, energy limitations, and environmental factors, and the information that is successfully transmitted can also be contaminated by non-Gaussian noise.
arxiv
A new method for improving security in MANETs AODV Protocol [PDF]
In mobile ad hoc network (MANET), secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained ...
Zahra Alishahi+2 more
doaj
Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things [PDF]
The interconnection of resource-constrained and globally accessible things with untrusted and unreliable Internet make them vulnerable to attacks including data forging, false data injection, and packet drop that affects applications with critical decision-making processes.
arxiv +1 more source
Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs
Designing wireless sensor networks (WSNs) that can work reliably in the presence of inside packet drop attackers is very challenging. Current trust mechanisms and avoidance approaches are promising but have their limitations.
Youngho Cho, Gang Qu
doaj +1 more source
Secure IoT Routing: Selective Forwarding Attacks and Trust-based Defenses in RPL Network [PDF]
IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is an essential routing protocol to enable communications for IoT networks with low power devices. RPL uses an objective function and routing constraints to find an optimized routing path for each node in the network.
arxiv
Moving target defense against network eavesdropping attack using POF
Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches ...
Duohe MA, Qiong LI, Dongdai LIN
doaj +2 more sources