Results 41 to 50 of about 83,142 (315)

Secure Routing in Wireless Mesh Networks [PDF]

open access: yes, 2011
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers ...
Sen, Jaydip
core   +3 more sources

SecSip: A Stateful Firewall for SIP-based Networks [PDF]

open access: yes, 2009
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core   +5 more sources

Capability Analysis of Attacks in Wireless Sensor Network [PDF]

open access: yes, 2017
Security is key concern area in WSN as the nature of such networks makes them susceptible to various types of attacks. Driven by this, a lot of research work has been done to classify the attacks and their prevention schemes.
, Neha Singh, Dr. Deepali Virmani
core   +2 more sources

Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc Networks

open access: yesWireless personal communications, 2021
The decentralized administration and the lack of an appropriate infrastructure causes the MANET prone to attacks. The attackers play on the vulnerable characteristics of the MANET and its underlying routing protocols such as AODV, DSR etc. to bring about
S. Sivanesh, V. R. Sarma Dhulipala
semanticscholar   +1 more source

Joint Security and QoS Provisioning in Train-Centric CBTC Systems Under Sybil Attacks

open access: yesIEEE Access, 2019
The security and Quality-of-Service (QoS) provisioning are two critical themes in urban rail communication-based train control (CBTC) data communication systems, which can directly affect the train's safe operation.
Xiaoxuan Wang   +3 more
doaj   +1 more source

Defending against packet dropping attack in vehicularad hocnetworks [PDF]

open access: yesSecurity and Communication Networks, 2008
AbstractVehicularad hocnetworks (VANETs) are becoming very popular and a promising application of the so‐called mobilead hocnetworks (MANET) technology. It has attracted recently an increasing attention from many car manufacturers as well as the wireless communication research community.
Djahel, S   +3 more
openaire   +3 more sources

EAODV: A*-BASED ENHANCEMENT AD-HOC ON DEMAND VECTOR PROTOCOL TO PREVENT BLACK HOLE ATTACKS

open access: yesJurnal Ilmu Komputer dan Informasi, 2013
Black hole attack is an attack where a node that responds to RREQ from the source node by replying a fake freshness information and false hop count. The black hole nodes do not respond to distributed co-operation in routing protocol to absorb all the ...
Khalil I Ghathwan   +2 more
doaj   +1 more source

IDLP: An Efficient Intrusion Detection and Location-Aware Prevention Mechanism for Network Coding-Enabled Mobile Small Cells

open access: yesIEEE Access, 2020
Mobile small cell technology is considered as a 5G enabling technology for delivering ubiquitous 5G services in a cost-effective and energy efficient manner.
Reza Parsamehr   +3 more
doaj   +1 more source

FAIR: Forwarding Accountability for Internet Reputability

open access: yes, 2016
This paper presents FAIR, a forwarding accountability mechanism that incentivizes ISPs to apply stricter security policies to their customers. The Autonomous System (AS) of the receiver specifies a traffic profile that the sender AS must adhere to ...
Pappas, Christos   +2 more
core   +1 more source

Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]

open access: yes, 2003
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J.   +1 more
core   +3 more sources

Home - About - Disclaimer - Privacy