Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks [PDF]
In wireless ad hoc networks, the absence of any control on packets forwarding, make these networks vulnerable by various deny of service attacks (DoS). A node, in wireless ad hoc network, counts always on intermediate nodes to send these packets to a given destination node.
arxiv
AccFlow: Defending Against the Low-Rate TCP DoS Attack in Wireless Sensor Networks [PDF]
Because of the open nature of the Wireless Sensor Networks (WSN), the Denial of the Service (DoS) becomes one of the most serious threats to the stability of the resourceconstrained sensor nodes. In this paper, we develop AccFlow which is an incrementally deployable Software-Defined Networking based protocol that is able to serve as a countermeasure ...
arxiv
On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks [PDF]
Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails to correctly ...
arxiv +1 more source
Control over adversarial packet-dropping communication networks revisited [PDF]
We revisit a one-step control problem over an adversarial packet-dropping link. The link is modeled as a set of binary channels controlled by a strategic jammer whose intention is to wage a `denial of service' attack on the plant by choosing a most damaging channel-switching strategy.
arxiv
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis [PDF]
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet generated by a Byzantine attacker can easily contaminate the information to multiple destinations.
arxiv
Adaptive Attack Mitigation for IoV Flood Attacks [PDF]
Gateway Servers for the Internet of Vehicles (IoV) must meet stringent Security and Quality of Service (QoS) requirements, including cyberattack protection, low delays and minimal packet loss, to offer secure real-time data exchange for human and vehicle safety and efficient road traffic management.
arxiv
Reliability Analysis to overcome Black Hole Attack in Wireless Sensor Network [PDF]
Wireless sensor networks are vulnerable to several attacks, one of them being the black hole attack. A black hole is a malicious node that attracts all the traffic in the network by advertising that it has the shortest path in the network. Once it receives the packet from other nodes, it drops all the packets causing loss of critical information.
arxiv
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems [PDF]
Networked control systems consist of distributed sensors and actuators that communicate via a wireless network. The use of an open wireless medium and unattended deployment leaves these systems vulnerable to intelligent adversaries whose goal is to disrupt the system performance. In this paper, we study the wormhole attack on a networked control system,
arxiv
CONSERVING AND DETECTING PACKET DROPPING ATTACKS IN WIRELESS NETWORKS USING BLOOM FILTER
openalex +1 more source