Filters








1,308 Hits in 5.8 sec

Securing the Wireless Sensor Network from Denial of Sleep attack by isolating the Nodes

Simerpreet Kaur, Md. Ataullah
2014 International Journal of Computer Applications  
Denial of sleep is a type of denial of service attack which prevent nodes from going into sleep mode and resulting in short network lifetime. To secure the system, various techniques are used.  ...  This paper represents a more efficient and feasible solution to solve the problem of denial of sleep attack of isolating the nodes to be used in hierarchical clustering.  ...  In this paper we are only concern with the denial of sleep attack which is a type of denial of service attack on data link layer [2].  ... 
doi:10.5120/18040-8920 fatcat:iubtscz6orhhvge4nnlrwaqfxq

Security from Denial of Sleep Attack in Wireless Sensor Network

Simerpreet Kaur, Md. Ataullah, Monika Garg
2005 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
Denial of sleep attacks are a great threat to lifetime of sensor networks as it prevents the nodes from going into sleep mode.  ...  In this paper we are describing prevention against Denials of sleep attack. We have analyzed each of proposed solutions, identify their strengths and limitations.  ...  In this paper we are only concern with the denial of sleep attack which is type of denial of service attack on data link layer.  ... 
doi:10.24297/ijct.v4i2b1.3230 fatcat:slmo3iyeqjbbxaqr5k3l3h6geq

A Secure and Power Efficient Routing Scheme for Ad Hoc Networks

Ashwani Kush, Divya Sharma, Sunil Taneja
2011 International Journal of Computer Applications  
The ad hoc environment is accessible to both legitimate network users and malicious attackers. The ad hoc environment has the constraint of power factor.  ...  This paper is an effort to combine these factors of security and power to achieve more reliable routing.  ...  for subversion and launching denial of service attacks.  ... 
doi:10.5120/2515-3415 fatcat:57sm764t5bhmrnmwvvitb5qidi

Distributed Denial of Service Attacks: A Review

Sonali Swetapadma Sahu, Manjusha Pandey
2014 International Journal of Modern Education and Computer Science  
DDoS (Distributed Denial of Service) is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.  ...  A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that  ...  conditions  Ease of use A DDOS attack (better known as a Distributed Denial of Service attack) is a type of web attack that seeks to disrupt the normal function of the targeted computer network.  ... 
doi:10.5815/ijmecs.2014.01.07 fatcat:4inss32cr5fbjn6j7spklywrte

Security-Aware Packet Scheduling Scheme with Multi-Level Queuing and RSA

J. Antony Suganiya, J. Viji Priya
2014 IOSR Journal of Computer Engineering  
Existing scheduling algorithms for real-time wireless networks are not capable of providing higher level of security.  ...  Emerging security-aware packet scheduling algorithms can efficiently improve the security measures while forwarding the packets over wireless links.  ...  The lack of security mechanism and the threat of denial of service (DOS) attacks are risks associated with the wireless transmissions.  ... 
doi:10.9790/0661-16225863 fatcat:gtxkpa6eavcjnk2s3jcozswraq

An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses

Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa
2019 Entropy  
In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks.  ...  in the face of jamming attacks in wireless channels and malicious packet drops in multi-hop networks.  ...  modeling denial-of-service attacks.  ... 
doi:10.3390/e21020210 pmid:33266925 fatcat:kbjpmxnfqneqzffufjiem7wuhi

Quality of Service-aware Security Framework for Mobile Ad hoc Networks using Optimized Link State Routing Protocol [article]

Thulani Phakathi, Francis Lugayizi, Michael Esiefarienrhe
2020 arXiv   pre-print
All networks must provide an acceptable and desirable level of Quality of Service (QoS) to ensure that applications are well supported.  ...  The proposed framework is one that optimizes the use of network resources and time.  ...  It can feed nodes fake packets or even denial of service (DoS).  ... 
arXiv:2010.01852v1 fatcat:kz7m3nn3ezcvlly22xfrzue3ea

CNN-LSTM Based Approach for Dos Attacks Detection in Wireless Sensor Networks

Salim Salmi, Lahcen Oughdir
2022 International Journal of Advanced Computer Science and Applications  
A denial-of-service (DoS) attack is a coordinated attack by many endpoints, such as computers or networks.  ...  the state of the respective sensor and simulate five forms of Denial of Service (DoS) attacks.  ...  Figure 1 presents the wireless sensor networks with denial of service attacks.  ... 
doi:10.14569/ijacsa.2022.0130497 fatcat:5ryiissgj5cvpkzmfccctusl5y

Optimal ECC Based Hybrid Signcryption for MANET Security

Sujatha R, Ramakrishnan M
2016 International Journal on Intelligent Electronic Systems  
Elliptic curve method is significantly efficient with reduced key size, and it is highly infeasible against Brute force attacks when compared with Advanced Encryption standard methods .As the key size  ...  to attacks because of their open environment ,where all nodes are involved in the data transfer .To improve the performance in MANETs and to protect it from various attacks we propose a highly secured  ...  Then, the network is subjected to Denial-of-service (DOS) attack, a security attack which is responsible for high degree of packet loss and increase in the transmission delay or latency.  ... 
doi:10.18000/ijies.30149 fatcat:ap6bdrjidfgxrishc5pf42hcmq

Optimal Secure Energy Efficient Routing Technique for Zone Based Wireless Sensor Network using Fuzzy Logic

2020 International Journal of Emerging Trends in Engineering Research  
This work proposes an optimal secure energy efficient routing with proactive detection of malicious zones and mitigation from the attacks.  ...  Optimization of energy consumption is obligatory for an increased life time of the network.  ...  Due to Wireless infrastructure, WSNs are prone to various attacks like message drops, message tampering, denial of service through message flooding etc.  ... 
doi:10.30534/ijeter/2020/358102020 fatcat:k2j5cawbfffmligfgv562eivli

Privacy-Preserving Data Access Control in the Smart Grid [chapter]

2016 Cyber Security for Industrial Control Systems  
Optimal sensor power scheduling for state estimation of gauss-markov systems over a packet-dropping network. IEEE Transactions on Signal Processing, 60(5):2701-2705, 2012.36. B. Sinopoli, L.  ...  Optimal Denial-of-Service Attack Policy against Wireless Industrial Control Systems  ... 
doi:10.1201/b19629-16 fatcat:vgv3w7wp4ves5d33es4ztfspom

Secure Energy Efficient Attack Resilient Routing Technique for Zone based Wireless Sensor Network

Venkateswara Rao M, Srinivas Malladi
2020 International Journal of Advanced Computer Science and Applications  
Optimization of energy consumption is obligatory for an increased life time of the network.  ...  This work proposes a secure energy efficient attack resilient routing technique for zone based wireless sensor network with proactive detection of malicious zones and mitigation from the attacks.  ...  Due to Wireless infrastructure, WSNs are prone to various attacks like message drops, message tampering, denial of service through message flooding etc.  ... 
doi:10.14569/ijacsa.2020.0111267 fatcat:2s6ek2xjlbghtj4md77henmaaq

Arpeggio: A Penetration Attack on Glossy Networks

Zhitao He, Kasun Hewage, Thiemo Voigt
2016 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)  
Glossy networks make use of concurrent transmissions to achieve rapid network flooding in wireless networks with high reliability. They are robust against jamming and header injection attacks.  ...  We find that Glossy floods can be hijacked by a packet injection attacker to penetrate into the network and cause severe loss.  ...  Wood et al. present several denial-of-service attacks on wireless sensor networks and ways to map the jammed region [11] .  ... 
doi:10.1109/sahcn.2016.7732971 dblp:conf/secon/HeHV16 fatcat:zzwpyctepbgkhes6lnugmzk7ci

Security and Privacy for Emerging Smart Community Infrastructures

Bogdan Copos, Karl Levitt, Jeff Rowe, Parisa Kianmajd, Chen-Nee Chuah, George Kesidis
2016 Proceedings of the International Conference on Internet of Things and Big Data  
Smart communities of the future have features that make them susceptible to novel forms of cyber-attack and a potential loss of privacy for the citizens they serve.  ...  We view these communities as metro level wide area control systems with sensors and actuators located in residences, the workplace, in mobile vehicles and even worn on the body.  ...  ACKNOWLEDGEMENTS We wish to acknowledge the generous support of the UC Davis RISE initiative and the NSF SaTC program which funded portions of this work.  ... 
doi:10.5220/0005929901480155 dblp:conf/iotbd/CoposLRKCK16 fatcat:qedf4c72kndvlgsvntfjdtzb5e

Biometric based Security Solutions for MANET: A Review

Ajay Jangra, Shivi Goel
2013 International Journal of Computer Network and Information Security  
This paper critically reviews and investigates the present biometric based security models works for MANETs, and along with security challenges and direction of further research are proposed.  ...  Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communicat ion and to work under vulnerable environ ment.  ...  Denial of Service (DoS): These types of threats produced a malicious action with I.J.  ... 
doi:10.5815/ijcnis.2013.10.07 fatcat:qdew6trqp5cplfylbrsqa2nmiq
« Previous Showing results 1 — 15 out of 1,308 results