Results 31 to 40 of about 84,064 (194)

Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc Networks

open access: yesWireless personal communications, 2021
The decentralized administration and the lack of an appropriate infrastructure causes the MANET prone to attacks. The attackers play on the vulnerable characteristics of the MANET and its underlying routing protocols such as AODV, DSR etc. to bring about
S. Sivanesh, V. R. Sarma Dhulipala
semanticscholar   +1 more source

EAODV: A*-BASED ENHANCEMENT AD-HOC ON DEMAND VECTOR PROTOCOL TO PREVENT BLACK HOLE ATTACKS

open access: yesJurnal Ilmu Komputer dan Informasi, 2013
Black hole attack is an attack where a node that responds to RREQ from the source node by replying a fake freshness information and false hop count. The black hole nodes do not respond to distributed co-operation in routing protocol to absorb all the ...
Khalil I Ghathwan   +2 more
doaj   +1 more source

IDLP: An Efficient Intrusion Detection and Location-Aware Prevention Mechanism for Network Coding-Enabled Mobile Small Cells

open access: yesIEEE Access, 2020
Mobile small cell technology is considered as a 5G enabling technology for delivering ubiquitous 5G services in a cost-effective and energy efficient manner.
Reza Parsamehr   +3 more
doaj   +1 more source

FAIR: Forwarding Accountability for Internet Reputability

open access: yes, 2016
This paper presents FAIR, a forwarding accountability mechanism that incentivizes ISPs to apply stricter security policies to their customers. The Autonomous System (AS) of the receiver specifies a traffic profile that the sender AS must adhere to ...
Pappas, Christos   +2 more
core   +1 more source

Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]

open access: yes, 2003
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J.   +1 more
core   +3 more sources

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

open access: yes, 2018
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.
Asoni, Daniele E.   +5 more
core   +1 more source

Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking [PDF]

open access: yes, 2013
Content-Centric Networking (CCN) is an emerging networking paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content becomes a first-class entity.
Compagno, Alberto   +3 more
core   +3 more sources

A new method for improving security in MANETs AODV Protocol [PDF]

open access: yesManagement Science Letters, 2012
In mobile ad hoc network (MANET), secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained ...
Zahra Alishahi   +2 more
doaj  

Detection techniques of selective forwarding attacks in wireless sensor networks: a survey

open access: yes, 2012
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar   +2 more
core   +2 more sources

Active router approach to defeating denial-of-service attacks in networks [PDF]

open access: yes, 2007
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core   +1 more source

Home - About - Disclaimer - Privacy