Filters








3,291 Hits in 9.1 sec

DDoS Attack and Defense Scheme in Wireless Ad hoc Networks

S.A Arunmozhi, Y Venkataramani
2011 International journal of network security and its applications  
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent  ...  In this paper, we discussed the DDoS attacks and proposed a defense scheme to improve the performance of the ad hoc networks.  ...  The new DOS attack, called Ad Hoc Flooding Attack(AHFA), can result in denial of service when used against on-demand routing protocols for mobile ad hoc networks, such as AODV & DSR.  ... 
doi:10.5121/ijnsa.2011.3312 fatcat:gul6dnflqnghvedmajkcgo7l7q

Detection of Cooperative Black Hole Attack in Wireless Ad Hoc Networks [article]

Jaydip Sen
2013 arXiv   pre-print
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner.  ...  Protecting the network layer of a MANET from malicious attacks is an important and challenging security issue, since most of the routing protocols for MANETs are vulnerable to various types of attacks.  ...  Deng, Li and Agarwal [2] have suggested a mechanism of defense against black hole attack in ad hoc networks.  ... 
arXiv:1302.4882v1 fatcat:idyjp77mqnccfmdst2tuhffpje

A Comparison of Link Layer Attacks on Wireless Sensor Networks

Shahriar Mohammadi, Hossein Jadidoleslamy
2011 International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks  
So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements.  ...  variety of WSNs' link layer attacks and a comparison of them.  ...  ; Goals and effects of this kind of attacks are:  Passive eavesdrop;  Packet replication, spoofing or modification; Availability This class of attacks known as Denial of Services (DoS) attacks; which  ... 
doi:10.5121/jgraphhoc.2011.3103 fatcat:574lhfevejfw3b6rwu4zrn6bb4

Secure routing in wireless sensor networks: attacks and countermeasures

Chris Karlof, David Wagner
2003 Ad hoc networks  
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal.  ...  We propose security goals for routing in sensor networks, present general classes of attacks, and analyze the security of nearly all the currently documented sensor network routing protocols and energy  ...  In the following section, we compare sensor networks to ad-hoc wireless networks.  ... 
doi:10.1016/s1570-8705(03)00008-8 fatcat:d224khzm2zbmnbvpqgzwm2ker4

MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks

Issa Khalil, Saurabh Bagchi, Ness B. Shroff
2008 Ad hoc networks  
There is significant interest in the research and development of ad hoc and sensor wireless networks for a variety of emerging applications.  ...  A particularly severe control attack on the routing functionality of wireless networks, called the wormhole attack, has been introduced in the context of ad hoc networks [11] [13]- [15] .  ...  Such a shared key may be obtained through one of several possible key management schemes existing in ad hoc wireless networks (e.g., [38] ).  ... 
doi:10.1016/j.adhoc.2007.02.001 fatcat:m6twgjhczfbkfcefp4niqxzeni

Prevention of Stealthy Attacks through Privacy Mechanism in Wireless Ad hoc Networks

D. V. Srihari Babu, P. Chandrasekhar Reddy
2017 Indian Journal of Science and Technology  
Objectives: Stealthy attacks are a kind of attacks which injects route fabrication information and producing false identification in network.  ...  Methods/Statistical Analysis: Wireless networks are becoming the most popular in today communication systems, where users prefer to have wireless connectivity regardless of its geographic location.  ...  A distinguished "Denial of Service" (DoS) attack is an attack with the identical goal.  ... 
doi:10.17485/ijst/2017/v10i16/112054 fatcat:hoj3gadhzzf55gazyal7jltfqy

Mitigating control-channel jamming attacks in multi-channel ad hoc networks

Loukas Lazos, Sisi Liu, Marwan Krunz
2009 Proceedings of the second ACM conference on Wireless network security - WiSec '09  
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks.  ...  Deviating from the traditional view that sees jamming attacks as a physical-layer vulnerability, we consider a sophisticated adversary who exploits knowledge of the protocol mechanics along with cryptographic  ...  Any opinions, findings, conclusions, or recommendations expressed in this paper are those of the author(s) and do not necessarily reflect the views of NSF.  ... 
doi:10.1145/1514274.1514299 dblp:conf/wisec/LazosLK09 fatcat:fmji24btrvfejffub6yhlp5l64

Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach

Lijun Qian, Ning Song, Xiangfang Li
2007 Journal of Network and Computer Applications  
Moreover, SAM may act as a module in local detection agents in an intrusion detection system (IDS) for wireless ad hoc networks. r  ...  Various routing attacks for single-path routing have been identified for wireless ad hoc networks and the corresponding counter measures have been proposed in the literature.  ...  Acknowledgements The authors would like to thank OPNET Technologies, Inc. for providing the OPNET software to perform the simulations in this study.  ... 
doi:10.1016/j.jnca.2005.07.003 fatcat:6vlgf72ehfc75lb36lr7dygnvu

A Localized Architecture for Detecting Denial of Service (DoS) Attacks in Wireless AD Hoc Networks [chapter]

Mieso K. Denko
Intelligence in Communication Systems  
In this paper we propose a reputation-based incentive scheme for detecting DoS attacks that target the network layer services.  ...  We evaluated the performance of the proposed scheme using simulation experiments. We studied a network with selfish nodes where the attack involves dropping packets.  ...  Existing studies on Denial of Services (DoS) attacks concentrate on the analysis of various attack scenarios targeting a specific layer [16] , or propose a probing mechanism to detect misbehaving node  ... 
doi:10.1007/0-387-32015-6_13 dblp:conf/intellcomm/Denko05 fatcat:qk24lxo2y5f4hpg6zjmj36p55a

A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey

Rajani B.Patil, Dhanashree Kulkarni
2014 International Journal of Computer Applications  
General Terms Security, secure transmission, routing, wireless ad hoc network, wormhole attack Keywords Shared cryptography, Secure energy efficient ad hoc routing  ...  Any attacker receive wireless signal by using transceiver and without being detected. Objective of this paper is to propose new approach for WSN security, i.e.  ...  INTRODUCTION A wireless sensor network is special type of wireless ad hoc network. A wireless sensor network is collection of thousands of tiny wireless sensor nodes for data communication purpose.  ... 
doi:10.5120/18871-0506 fatcat:plq56yudozejtasbt3lbnk5yda

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Tao Shu, Marwan Krunz
2015 IEEE Transactions on Mobile Computing  
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network.  ...  In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and  ...  Eventually, such a severe Denial-of-Service (DoS) attack can paralyze the network by partitioning its topology.  ... 
doi:10.1109/tmc.2014.2330818 fatcat:qbts7j4wdzanhmki6fldroxize

The feasibility of launching and detecting jamming attacks in wireless networks

Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood
2005 Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '05  
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks.  ...  Specifically, we propose four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluate their effectiveness in terms of how each method  ...  CONCLUSIONS Wireless networks are being deployed in a variety of forms, ranging from ad hoc networks to wireless LANs to sensor networks.  ... 
doi:10.1145/1062689.1062697 dblp:conf/mobihoc/XuTZW05 fatcat:ryeupqkfwvdiphoiwnjrmfpa3e

Various Techniques to detect DOS attack in VANET: A Review

Rajwinder Kaur, Usvir Kaur
2017 International Journal of Computer Applications  
In the network various when some malicious nodes join the network and that nodes are responsible to trigger DOS type of attack which reduce network performance.  ...  Due to decentralized architecture of vehicular adhoc networks many malicious nodes may join the network which is responsible to trigger various type of active and passive type of attacks.  ...  Jonsson 2014 A method for real time detaction of denial of services attacks in IEEE 8021.11p vehicular ad hoc networks is proposed.  ... 
doi:10.5120/ijca2017913718 fatcat:pezg2z32ebbydb27mggmzp4iha

A Methodology to Counter DoS Attacks in Mobile IP Communication

Sazia Parvin, Farookh Khadeer Hussain, Sohrab Ali
2012 Mobile Information Systems  
The number of approaches hitherto proposed to prevent DoS attack in the area of mobile IP communication is much less compared to those for the wired domain and mobile ad hoc networks.  ...  Of these attacks, Denial of Service (DoS) attack is considered as a great threat to mobile IP communication.  ...  Some research has also been done on the detection and prevention of DoS attacks, but most of them are for either wired communication or mobile ad hoc networking.  ... 
doi:10.1155/2012/268781 fatcat:y4wzevbaxrcyvdfmuj2wcwywfm

Security against DOS attack in mobile IP communication

Sazia Parvin, Shohrab Ali, Song Han, Tharam Dillon
2009 Proceedings of the 2nd international conference on Security of information and networks - SIN '09  
Among different kinds of attack Denial-of-Service (DoS) is a great threat for mobile IP communication.  ...  As like as wired communication and mobile ad hoc networking, mobile IP communication is also vulnerable to different kinds of attack.  ...  Some researches also have been done for detecting and preventing DoS attack, but all of them are for wired communication or mobile ad hoc networking. Xiang et al.  ... 
doi:10.1145/1626195.1626234 dblp:conf/sin/ParvinAHD09 fatcat:b2gtaukfrvcrreitsbn7367ssa
« Previous Showing results 1 — 15 out of 3,291 results