Results 51 to 60 of about 60,380 (140)

Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks [PDF]

open access: yesInternational Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 10-16, January 2010, USA, 2010
In wireless ad hoc networks, the absence of any control on packets forwarding, make these networks vulnerable by various deny of service attacks (DoS). A node, in wireless ad hoc network, counts always on intermediate nodes to send these packets to a given destination node.
arxiv  

AccFlow: Defending Against the Low-Rate TCP DoS Attack in Wireless Sensor Networks [PDF]

open access: yesarXiv, 2019
Because of the open nature of the Wireless Sensor Networks (WSN), the Denial of the Service (DoS) becomes one of the most serious threats to the stability of the resourceconstrained sensor nodes. In this paper, we develop AccFlow which is an incrementally deployable Software-Defined Networking based protocol that is able to serve as a countermeasure ...
arxiv  

On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks [PDF]

open access: yes, 2009
Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails to correctly ...
arxiv   +1 more source

Control over adversarial packet-dropping communication networks revisited [PDF]

open access: yesarXiv, 2014
We revisit a one-step control problem over an adversarial packet-dropping link. The link is modeled as a set of binary channels controlled by a strategic jammer whose intention is to wage a `denial of service' attack on the plant by choosing a most damaging channel-switching strategy.
arxiv  

Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis [PDF]

open access: yesarXiv, 2008
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet generated by a Byzantine attacker can easily contaminate the information to multiple destinations.
arxiv  

Adaptive Attack Mitigation for IoV Flood Attacks [PDF]

open access: yesarXiv
Gateway Servers for the Internet of Vehicles (IoV) must meet stringent Security and Quality of Service (QoS) requirements, including cyberattack protection, low delays and minimal packet loss, to offer secure real-time data exchange for human and vehicle safety and efficient road traffic management.
arxiv  

Reliability Analysis to overcome Black Hole Attack in Wireless Sensor Network [PDF]

open access: yesarXiv, 2014
Wireless sensor networks are vulnerable to several attacks, one of them being the black hole attack. A black hole is a malicious node that attracts all the traffic in the network by advertising that it has the shortest path in the network. Once it receives the packet from other nodes, it drops all the packets causing loss of critical information.
arxiv  

A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems [PDF]

open access: yesarXiv, 2013
Networked control systems consist of distributed sensors and actuators that communicate via a wireless network. The use of an open wireless medium and unattended deployment leaves these systems vulnerable to intelligent adversaries whose goal is to disrupt the system performance. In this paper, we study the wormhole attack on a networked control system,
arxiv  

Home - About - Disclaimer - Privacy