Results 41 to 50 of about 83,142 (315)
Secure Routing in Wireless Mesh Networks [PDF]
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers ...
Sen, Jaydip
core +3 more sources
SecSip: A Stateful Firewall for SIP-based Networks [PDF]
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core +5 more sources
Capability Analysis of Attacks in Wireless Sensor Network [PDF]
Security is key concern area in WSN as the nature of such networks makes them susceptible to various types of attacks. Driven by this, a lot of research work has been done to classify the attacks and their prevention schemes.
, Neha Singh, Dr. Deepali Virmani
core +2 more sources
The decentralized administration and the lack of an appropriate infrastructure causes the MANET prone to attacks. The attackers play on the vulnerable characteristics of the MANET and its underlying routing protocols such as AODV, DSR etc. to bring about
S. Sivanesh, V. R. Sarma Dhulipala
semanticscholar +1 more source
Joint Security and QoS Provisioning in Train-Centric CBTC Systems Under Sybil Attacks
The security and Quality-of-Service (QoS) provisioning are two critical themes in urban rail communication-based train control (CBTC) data communication systems, which can directly affect the train's safe operation.
Xiaoxuan Wang+3 more
doaj +1 more source
Defending against packet dropping attack in vehicularad hocnetworks [PDF]
AbstractVehicularad hocnetworks (VANETs) are becoming very popular and a promising application of the so‐called mobilead hocnetworks (MANET) technology. It has attracted recently an increasing attention from many car manufacturers as well as the wireless communication research community.
Djahel, S+3 more
openaire +3 more sources
EAODV: A*-BASED ENHANCEMENT AD-HOC ON DEMAND VECTOR PROTOCOL TO PREVENT BLACK HOLE ATTACKS
Black hole attack is an attack where a node that responds to RREQ from the source node by replying a fake freshness information and false hop count. The black hole nodes do not respond to distributed co-operation in routing protocol to absorb all the ...
Khalil I Ghathwan+2 more
doaj +1 more source
Mobile small cell technology is considered as a 5G enabling technology for delivering ubiquitous 5G services in a cost-effective and energy efficient manner.
Reza Parsamehr+3 more
doaj +1 more source
FAIR: Forwarding Accountability for Internet Reputability
This paper presents FAIR, a forwarding accountability mechanism that incentivizes ISPs to apply stricter security policies to their customers. The Autonomous System (AS) of the receiver specifies a traffic profile that the sender AS must adhere to ...
Pappas, Christos+2 more
core +1 more source
Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J.+1 more
core +3 more sources