Filters








8,131 Hits in 9.1 sec

An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks

David de Andr#, Jesús Friginal, Juan-Carlos Ruiz, Pedro Gil
2009 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing  
This paper deals with this challenging goal by proposing an attack injection approach based on real ad hoc networks as experimental platform.  ...  Accordingly, the confident use of this technology requires the development of new techniques and tools to assess the robustness of such networks in presence of attacks.  ...  ACKNOWLEDGEMENT Sponsored by the Spanish project MEC TIN2006-08234.  ... 
doi:10.1109/prdc.2009.43 dblp:conf/prdc/AndresFRG09 fatcat:qutkncw42fhoxf4kdo4ckevzgm

REFRAHN: A Resilience Evaluation Framework for Ad Hoc Routing Protocols

Jesús Friginal, David de Andrés, Juan-Carlos Ruiz, Miquel Martínez
2015 Computer Networks  
Keywords: ad hoc networks, fault and attack injection, resilience, experimental evaluation, testbeds.  ...  results to evaluate ad hoc networks.  ...  Acknowledgements This work was supported in part by the Spanish Project ARENES under Grant TIN2012-38308-C02-01 and in part by the Programa de Ayudas de Investigacin y Desarrollo through the Universitat  ... 
doi:10.1016/j.comnet.2015.02.032 fatcat:qjugmfpxa5holplbve7biie6e4

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

Jun Cheol Park, Sneha Kumar Kasera
2007 2007 IEEE Wireless Communications and Networking Conference  
We propose to secure ad hoc networks against data injection attacks by placing firewall functionality at strategic locations in the ad hoc network.  ...  Next, we develop an architecture to determine the location of the attackers.  ...  Due to lack of an infrastructure and a well defined perimeter, ad hoc networks are susceptible to a variety of attacks.  ... 
doi:10.1109/wcnc.2007.527 dblp:conf/wcnc/ParkK07 fatcat:m72dzkt5svhnvfvsz5juzggkwy

On Selecting Representative Faultloads to Guide the Evaluation of Ad Hoc Networks

Jesús Friginal, David de Andrés, Juan-Carlos Ruiz, Pedro Gil
2011 2011 5th Latin-American Symposium on Dependable Computing  
Our previous work focused on evaluating the impact of black and grey hole attacks in real networks using attack injection.  ...  In consequence, apart from enforcing the dependability and security aspects of these networks, the provision of approaches to evaluate their behaviour in the presence of faults and attacks is of paramount  ...  ACKNOWLEDGEMENTS Work sponsored by the Spanish project TIN2009-13825.  ... 
doi:10.1109/ladc.2011.18 dblp:conf/ladc/FriginalARG11 fatcat:w7fw2jkmffdjnigjgnwzvcfnda

A survey of evaluation platforms for ad hoc routing protocols: A resilience perspective

Jesús Friginal, David de Andrés, Juan-Carlos Ruiz, Miquel Martínez
2014 Computer Networks  
Acknowledgements This work is partially supported by the Spanish project ARENES (TIN2012-38308-C02-01), the ANR French project AMORES (ANR-11-INSE-010), and the Intel Doctoral Student Honour Programme  ...  To date, the analysis of evaluation results in ad hoc networks has been an aspect strongly relying on the human factor.  ...  Unfortunately, to date, the semantic reconciliation remains an rarely issue in the domain of evaluation platforms for ad hoc networks.  ... 
doi:10.1016/j.comnet.2014.09.010 fatcat:btliobjt2jcupe37k7wtrlgcqe

Network Layer Attacks and Their Countermeasures in Manet: A Review

Manisha Manisha, Dr. Mukesh Kumar
2014 IOSR Journal of Computer Engineering  
Mobile ad hoc network(MANET) is a collection of mobile nodes that are free to move in any direction. It is an infrastructureless network means it has no fixed or predefined network.  ...  This paper outlines various network layer security attacks and their preventive measures in Mobile Ad-hoc Network.  ...  Also proposed an efficient on-the-fly search technique to trace back DoS attackers. II. Conclusion In this paper, one can see the various network layer attacks on mobile ad-hoc networks.  ... 
doi:10.9790/0661-1625113116 fatcat:iekn6pmt7naofaxjsf6cjuxgoq

Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach

Wei Yu, K.J. Ray Liu
2008 IEEE Transactions on Information Forensics and Security  
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious.  ...  The performance of the devised strategies has also been evaluated analytically.  ...  This suggests that the proposed strategy is robust to injecting a traffic attack. H.  ... 
doi:10.1109/tifs.2008.922453 fatcat:2go2zpj3jjg5xibu66q2xsnxvu

Secure Lightweight Routing Protocol with Confidentiality Redundancy in Wireless Ad Hoc Networks (SLRCR)

M. Taheri
2015 International Journal of Information and Electronics Engineering  
This protocol is lightweight and robust; also, it is able to prevent large number types of routing attacks.  ...  Routing is a critical function in multi-hop mobile ad hoc networks. The most important requirement for MANET routing protocols is the ability to operate in adversarial environments.  ...  We base the design of SLRCR in part on the Ariadne ad hoc network routing protocol.  ... 
doi:10.7763/ijiee.2015.v5.540 fatcat:nxt2dpvclfeahpbrjq7h5ujb24

Grilling Gratuitous Detour in ADHOC Network

S Vijayalakshmi, S Albert Rabara
2011 International Journal of Distributed and Parallel systems  
The peril of Gratuitous detour on routing process in ad hoc network is manifold which culminates in the deterioration of network performance amounting to deplorable network behavior.  ...  Routing in ad hoc network is a cooperative process as it requires periodic assistance from the intermediate nodes to route the packets to the far off nodes that are beyond the direct wireless transmission  ...  Hu, C.Y. et al [5] present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne.  ... 
doi:10.5121/ijdps.2011.2204 fatcat:6jll67pb7bf7vjntygkrp4jnk4

A Threat Model Approach for Classification of Network Layer Attacks in WSN

Bhavna Arora
2013 International Journal of Computer Applications  
Several small and low cost devices are included in the sensor networks which are self organizing ad hoc systems.  ...  WSNs are susceptible to many types of attacks at various layers of networks but due to limited resources most of traditional networks security techniques are unusable on WSNs.  ...  Sensor networks are just one form of ad hoc wireless networks, and hence we can consider them as sensor-based ad hoc mobile wireless networks.  ... 
doi:10.5120/10492-5249 fatcat:7rdsyrynqzbjxlqbteysnz6bju

Insight to Research Progress on Secure Routing in Wireless Ad hoc Network

Jyoti Neeli, N K
2017 International Journal of Advanced Computer Science and Applications  
The study outcome of the paper finds that progress towards wireless ad hoc network is still very less and there is a need to come up with robust security framework.  ...  Wireless Ad hoc Network offers a cost effective communication to the users free from any infrastructural dependencies.  ...  [24] have evaluated the strength of existing security approaches. The study outcome speaks of non-availability of robust security feature while routing in WMN. B.  ... 
doi:10.14569/ijacsa.2017.080609 fatcat:3v335zksfzfrrklszrda5cgyaa

The effect of Mobility Models on a Secured Enhanced and Reliable Ad Hoc Multicasting Protocol

Sherif M.Badr
2013 International Journal of Computer Applications  
SERAMP is a new technique to be used for Multicasting in Ad-Hoc Networks and to solve the security problems associated with multicasting in Ah-Hoc Networks.  ...  The objective of this paper is to study the effects of mobility models on the new proposed secured and enhanced reliable Ad Hoc Multicasting Protocol (SERAMP).  ...  The results presented prove the importance of choosing an appropriate mobility model for the performance evaluation of a given ad hoc network protocol.  ... 
doi:10.5120/13832-0335 fatcat:fhuoo7hbjfge7d6g5bwqef6d5u

URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks

H. Luo, J. Kong, P. Zerfos, S. Lu, L. Zhang
2004 IEEE/ACM Transactions on Networking  
ACKNOWLEDGMENT The authors greatly appreciate all the constructive comments by Dr. K. Nahrstedt and the reviewers.  ...  The node ID can be its IP address or its MAC address in the context of an ad hoc networking environment.  ...  In this paper, we propose URSA, a fully localized design paradigm to provide ubiquitous and robust access control for mobile ad hoc networks. The proposed solution takes a ticket-based approach.  ... 
doi:10.1109/tnet.2004.838598 fatcat:acxfvrc75vh27kjzaglwm2ix4a

Reliability estimation in mobile ad hoc networks

Ritu Chadha, Alexander Poylisher, Constantin Serban
2013 Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013)  
We describe a system for estimating the reliability of nodes in a mobile ad hoc network.  ...  The goal of the system is to detect insider attacks on the control plane of wireless protocols at the link and network layers, and to generate and propagate corresponding reliability estimates for nodes  ...  We used ns-2 to simulate a 50-node 802.11 ad hoc network.  ... 
doi:10.1109/cnsm.2013.6727835 dblp:conf/cnsm/ChadhaPS13 fatcat:g36nqmndbnb7zo4r5um4fcre44

Profile based Novel Approach for Jamming Attack Detection and Prevention in MANET

Aparna Raj, Pankaj Kumar
2017 International Journal of Computer Applications  
Subsequently, accomplishing security objectives for mobile ad hoc network (MANET) has increased critical consideration of the scholarly world and research community in recent years.  ...  The uses of the security methods of wired systems, for example, access control and confirmation/authentication have been unsuitable to wireless network because of the extraordinary features of such networks  ...  Mobile Ad hoc Networks are infrastructure less and utilize wireless link for communication which makes them unpleasantly vulnerable to an adversary's Mobile ad hoc networks.  ... 
doi:10.5120/ijca2017914243 fatcat:g6vlnu4ydfeuniljj6rarizfdy
« Previous Showing results 1 — 15 out of 8,131 results