Filters








56 Hits in 7.6 sec

Mitigating denial-of-service attacks in MANET by distributed packet filtering

Xiaoxin Wu, David K. Y. Yau
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
Defending against denial-of-service (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish.  ...  A network game can be formulated in which nodes along a network path, in optimizing their own benefits, are encouraged to act collectively to filter out bad packets.  ...  GAME THEORETIC DOS MITIGATION IN MANET Mitigating DoS in MANET We require that legitimate sources digitally sign their packets.  ... 
doi:10.1145/1229285.1229329 dblp:conf/ccs/WuY07 fatcat:p5i2b4ydfbbnvcwcdmyaa3ugym

Mitigating Selfish Behavior in Mobile Ad Hoc Networks: A Survey

Mani P, Kamalakkannan P
2013 International Journal of Computer Applications  
In this paper, we review some of the notable works carried out in mitigating selfish behavior on packet forwarding at the network layer, providing a comprehensive comparison between the different proposed  ...  In MANETs, all the routing protocols are designed with an assumption that the nodes will cooperate in packet forwarding.  ...  Secure Incentive Protocol A credit-based protocol to stimulate cooperation among mobile nodes in packet forwarding in order to improve the network performance by mitigating the selfish behavior have proposed  ... 
doi:10.5120/13031-8846 fatcat:fsgx3caybbem7nhzihthzij2cm

A Highly Secured Approach against Attacks in MANETS

G.S. Mamatha, S. C. Sharma
2010 Journal of clean energy technologies  
This paper proposes a way to identify parallelly different types of attacks in MANETS.  ...  One of the major reasons to address the security aspects in MANETS is the usage of wireless transmission medium, which is highly susceptible or vulnerable to attacks.  ...  only rushing attack, black hole attack, neighbor attack and jellyfish attack [6]. 6) Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach [7]. 7  ... 
doi:10.7763/ijcte.2010.v2.246 fatcat:dvzq2n44uffeziiy65bzhqty2a

Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm

Pooja Kundu, Neeti Kashyap
2016 International Journal of Wireless and Microwave Technologies  
This halts intrusion in the network. A message digest is created of the data packets.  ...  In this paper we have proposed a modification of DSR by using message digest. The proposed work produces better results in terms of different metrics when compared with the results of DSR.  ...  A DSR based scheme BDSR [8] uses a bait technique to allure malicious nodes. In [9] a game theoretic approach is implemented. Black hole attacks are one of denial of service attacks.  ... 
doi:10.5815/ijwmt.2016.05.06 fatcat:e74wxcrd75dolbvunlehogvone

A Secure Mechanism Design-Based and Game Theoretical Model for MANETs

A. Rachedi, A. Benslimane, H. Otrok, N. Mohammed, M. Debbabi
2009 Journal on spesial topics in mobile networks and applications  
Our mechanism will motivate nodes that do not belong to the confident community to participate by giving them incentives in the form of trust, which can be used for cluster's services.  ...  Here, we consider the tradeoff between security and resource consumption by formulating the problem as a nonzero-sum noncooperative game between the CA and attacker.  ...  The role of RA nodes is to protect CA node against attack from unknown nodes such as Denial of Service (DoS). Any packet destined to CA node must be analyzed and filtered by RA nodes.  ... 
doi:10.1007/s11036-009-0164-7 fatcat:k26zi2nbibdo7ebquducvnig7m

Using game theory to model DoS attack and defence

Bhupender Kumar, Bubu Bhuyan
2019 Sadhana (Bangalore)  
Denial of service (DoS) or distributed denial of service (DDoS) attacks based on bandwidth depletion remain a persistent network security threat and have always been an important issue for system administrators  ...  Based on the strategic interactions, a game theoretical defence mechanism is proposed to mitigate DoS/DDoS attacks. The proposed mechanism is based on two-player zero-sum game.  ...  Xu and Lee [8] suggested a mechanism based on game theoretic approach to defend a web-service under DoS attack.  ... 
doi:10.1007/s12046-019-1228-4 fatcat:y654nv2o35g2losdigywocuyem

Game Theoretical Defense Mechanism Against Reputation Based Sybil Attacks

Bhupender Kumar, Bubu Bhuyan
2020 Procedia Computer Science  
In this paper, a game theoretical defense strategy based on zero sum and imperfect information game is proposed to discourage sybil attacks which exploit underlying reputation mechanism of a network.  ...  In this paper, a game theoretical defense strategy based on zero sum and imperfect information game is proposed to discourage sybil attacks which exploit underlying reputation mechanism of a network.  ...  These papers are not specifically based on game theoretical approach but give a basic insight into attack detection and mitigation methodologies used.  ... 
doi:10.1016/j.procs.2020.03.299 fatcat:7qq72w4xq5aoflvihlbomuqiri

A Game-Theoretic Decision-Making Framework for Engineering Self-Protecting Software Systems

Mahsa Emami-Taba
2017 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C)  
Targeted and destructive nature of strategies used by attackers to break down a software system require mitigation approaches with dynamic awareness.  ...  Inspired by game theory, in this research work, we model the interactions between the attacker and the software system as a two-player game.  ...  Words cannot express my gratitude for all her sweet gestures, encouragements and kind support during my ups and downs of starting a new life in Waterloo.  ... 
doi:10.1109/icse-c.2017.43 dblp:conf/icse/Emami-Taba17a fatcat:74km5e6offew7clmulxo3py6fa

Wireless networking security: open issues in trust, management, interoperation and measurement

Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
2006 International Journal of Security and Networks (IJSN)  
The design, development and evaluation of security techniques must begin with a thorough analysis of the requirements and a deeper understanding of the approaches that are practical within the system constraints  ...  He received a PhD from Princeton University in 1989, is a senior member of the IEEE and a member of the ACM. 2005.  ...  These relations are established based on a body of assurance evidence and have been used to mitigate various malicious attacks (Lamsal, 2001) .  ... 
doi:10.1504/ijsn.2006.010825 fatcat:glcvloozrbfyzb5hwjom3sjseq

Mobile ad hoc networking: imperatives and challenges

Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu
2003 Ad hoc networks  
The paper concludes by presenting a set of challenges and problems requiring further research in the future.  ...  These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field.  ...  Acknowledgements The work of Marco Conti was partially funded by the Information Society Technologies programme of the European Commission, Future and Emerging Technologies under the IST-2001-38113 MobileMAN  ... 
doi:10.1016/s1570-8705(03)00013-1 fatcat:dytlauexr5by3aj5hwg2jx7mi4

Reputation System Based Trust-Enabled Routing for Wireless Sensor Networks [chapter]

A. R.
2012 Wireless Sensor Networks - Technology and Protocols  
Thus, a misbehaving router node should not be able to drop a packet, misroute a packet or deny the ability of routing of other nodes by denial of service attacks.  ...  Denial of service attacks can increase the packet delay since some nodes acting as routers will be busy in responding to the attack and enforced to delay the processing of other packets.  ... 
doi:10.5772/50736 fatcat:cdyl4gvtwbh5nem2z5vgb3oy3q

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
In the fourth paper, "A Statistical Amalgamation Approach for Ontologies" by Peng Liu et al., put forward another way of ontology merging.  ...  The first paper, "Extensive Design for Attack's Recognition and Resistance of Survivable Network" by Hui Xu and Xiang Gu, gives a solution of attack defense of survivable network based on extentics.  ...  However, their model does not predict distributed Denial of service (DDoS) attacks while ours can.  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

A survey of attack and defense techniques for reputation systems

Kevin Hoffman, David Zage, Cristina Nita-Rotaru
2009 ACM Computing Surveys  
We classify attacks against reputation systems by identifying which system components and design choices are the target of attacks.  ...  These systems seek to generate an accurate assessment in the face of unprecedented community size, while providing anonymity and resilience to malicious attacks.  ...  Mitigating Denial of Service Attacks Mechanisms to prevent denial of service against the dissemination depend on the structure used for storage and transport.  ... 
doi:10.1145/1592451.1592452 fatcat:olalrku235ffxaqwp3pd3xpoj4

A social network approach to trust management in VANETs

Zhen Huang, Sushmita Ruj, Marcos A. Cavenaghi, Milos Stojmenovic, Amiya Nayak
2012 Peer-to-Peer Networking and Applications  
In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers.  ...  VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.).  ...  Acknowledgements This work is partially supported by NSERC Grant CRDPJ386874-09 and "Digital signal processing, and the synthesis of an information security system", TR32054, Serbian Ministry of Science  ... 
doi:10.1007/s12083-012-0136-8 fatcat:45kciaeg75c4hiasszfhoobjw4

Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Dong In Kim, Zhu Han
2016 arXiv   pre-print
Besides, we survey a variety of pricing strategies in providing incentives for phone users in crowdsensing applications to contribute their sensing data.  ...  This paper provides a state-of-the-art literature review on economic analysis and pricing models for data collection and wireless communication in Internet of Things (IoT).  ...  Due to this fact, pricing models have been employed to address secrurity and privacy issues in WSNs with the following approaches. • DoS attack prevention: A Denial-of-Service (DoS) attack is a deliberate  ... 
arXiv:1608.03475v1 fatcat:2jjbf3bw2vai5kqi74r56dviwe
« Previous Showing results 1 — 15 out of 56 results