Results 31 to 40 of about 84,064 (194)
The decentralized administration and the lack of an appropriate infrastructure causes the MANET prone to attacks. The attackers play on the vulnerable characteristics of the MANET and its underlying routing protocols such as AODV, DSR etc. to bring about
S. Sivanesh, V. R. Sarma Dhulipala
semanticscholar +1 more source
EAODV: A*-BASED ENHANCEMENT AD-HOC ON DEMAND VECTOR PROTOCOL TO PREVENT BLACK HOLE ATTACKS
Black hole attack is an attack where a node that responds to RREQ from the source node by replying a fake freshness information and false hop count. The black hole nodes do not respond to distributed co-operation in routing protocol to absorb all the ...
Khalil I Ghathwan +2 more
doaj +1 more source
Mobile small cell technology is considered as a 5G enabling technology for delivering ubiquitous 5G services in a cost-effective and energy efficient manner.
Reza Parsamehr +3 more
doaj +1 more source
FAIR: Forwarding Accountability for Internet Reputability
This paper presents FAIR, a forwarding accountability mechanism that incentivizes ISPs to apply stricter security policies to their customers. The Autonomous System (AS) of the receiver specifies a traffic profile that the sender AS must adhere to ...
Pappas, Christos +2 more
core +1 more source
Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J. +1 more
core +3 more sources
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.
Asoni, Daniele E. +5 more
core +1 more source
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking [PDF]
Content-Centric Networking (CCN) is an emerging networking paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content becomes a first-class entity.
Compagno, Alberto +3 more
core +3 more sources
A new method for improving security in MANETs AODV Protocol [PDF]
In mobile ad hoc network (MANET), secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained ...
Zahra Alishahi +2 more
doaj
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar +2 more
core +2 more sources
Active router approach to defeating denial-of-service attacks in networks [PDF]
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core +1 more source

