A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Securing the Wireless Sensor Network from Denial of Sleep attack by isolating the Nodes
2014
International Journal of Computer Applications
Denial of sleep is a type of denial of service attack which prevent nodes from going into sleep mode and resulting in short network lifetime. To secure the system, various techniques are used. ...
This paper represents a more efficient and feasible solution to solve the problem of denial of sleep attack of isolating the nodes to be used in hierarchical clustering. ...
In this paper we are only concern with the denial of sleep attack which is a type of denial of service attack on data link layer [2]. ...
doi:10.5120/18040-8920
fatcat:iubtscz6orhhvge4nnlrwaqfxq
Security from Denial of Sleep Attack in Wireless Sensor Network
2005
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Denial of sleep attacks are a great threat to lifetime of sensor networks as it prevents the nodes from going into sleep mode. ...
In this paper we are describing prevention against Denials of sleep attack. We have analyzed each of proposed solutions, identify their strengths and limitations. ...
In this paper we are only concern with the denial of sleep attack which is type of denial of service attack on data link layer. ...
doi:10.24297/ijct.v4i2b1.3230
fatcat:slmo3iyeqjbbxaqr5k3l3h6geq
A Secure and Power Efficient Routing Scheme for Ad Hoc Networks
2011
International Journal of Computer Applications
The ad hoc environment is accessible to both legitimate network users and malicious attackers. The ad hoc environment has the constraint of power factor. ...
This paper is an effort to combine these factors of security and power to achieve more reliable routing. ...
for subversion and launching denial of service attacks. ...
doi:10.5120/2515-3415
fatcat:57sm764t5bhmrnmwvvitb5qidi
Distributed Denial of Service Attacks: A Review
2014
International Journal of Modern Education and Computer Science
DDoS (Distributed Denial of Service) is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. ...
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that ...
conditions Ease of use A DDOS attack (better known as a Distributed Denial of Service attack) is a type of web attack that seeks to disrupt the normal function of the targeted computer network. ...
doi:10.5815/ijmecs.2014.01.07
fatcat:4inss32cr5fbjn6j7spklywrte
Security-Aware Packet Scheduling Scheme with Multi-Level Queuing and RSA
2014
IOSR Journal of Computer Engineering
Existing scheduling algorithms for real-time wireless networks are not capable of providing higher level of security. ...
Emerging security-aware packet scheduling algorithms can efficiently improve the security measures while forwarding the packets over wireless links. ...
The lack of security mechanism and the threat of denial of service (DOS) attacks are risks associated with the wireless transmissions. ...
doi:10.9790/0661-16225863
fatcat:gtxkpa6eavcjnk2s3jcozswraq
An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
2019
Entropy
In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. ...
in the face of jamming attacks in wireless channels and malicious packet drops in multi-hop networks. ...
modeling denial-of-service attacks. ...
doi:10.3390/e21020210
pmid:33266925
fatcat:kbjpmxnfqneqzffufjiem7wuhi
Quality of Service-aware Security Framework for Mobile Ad hoc Networks using Optimized Link State Routing Protocol
[article]
2020
arXiv
pre-print
All networks must provide an acceptable and desirable level of Quality of Service (QoS) to ensure that applications are well supported. ...
The proposed framework is one that optimizes the use of network resources and time. ...
It can feed nodes fake packets or even denial of service (DoS). ...
arXiv:2010.01852v1
fatcat:kz7m3nn3ezcvlly22xfrzue3ea
CNN-LSTM Based Approach for Dos Attacks Detection in Wireless Sensor Networks
2022
International Journal of Advanced Computer Science and Applications
A denial-of-service (DoS) attack is a coordinated attack by many endpoints, such as computers or networks. ...
the state of the respective sensor and simulate five forms of Denial of Service (DoS) attacks. ...
Figure 1 presents the wireless sensor networks with denial of service attacks. ...
doi:10.14569/ijacsa.2022.0130497
fatcat:5ryiissgj5cvpkzmfccctusl5y
Optimal ECC Based Hybrid Signcryption for MANET Security
2016
International Journal on Intelligent Electronic Systems
Elliptic curve method is significantly efficient with reduced key size, and it is highly infeasible against Brute force attacks when compared with Advanced Encryption standard methods .As the key size ...
to attacks because of their open environment ,where all nodes are involved in the data transfer .To improve the performance in MANETs and to protect it from various attacks we propose a highly secured ...
Then, the network is subjected to Denial-of-service (DOS) attack, a security attack which is responsible for high degree of packet loss and increase in the transmission delay or latency. ...
doi:10.18000/ijies.30149
fatcat:ap6bdrjidfgxrishc5pf42hcmq
Optimal Secure Energy Efficient Routing Technique for Zone Based Wireless Sensor Network using Fuzzy Logic
2020
International Journal of Emerging Trends in Engineering Research
This work proposes an optimal secure energy efficient routing with proactive detection of malicious zones and mitigation from the attacks. ...
Optimization of energy consumption is obligatory for an increased life time of the network. ...
Due to Wireless infrastructure, WSNs are prone to various attacks like message drops, message tampering, denial of service through message flooding etc. ...
doi:10.30534/ijeter/2020/358102020
fatcat:k2j5cawbfffmligfgv562eivli
Privacy-Preserving Data Access Control in the Smart Grid
[chapter]
2016
Cyber Security for Industrial Control Systems
Optimal sensor power scheduling for state estimation of gauss-markov systems over a packet-dropping network. IEEE Transactions on Signal Processing, 60(5):2701-2705, 2012.36. B. Sinopoli, L. ...
Optimal Denial-of-Service Attack Policy against Wireless Industrial Control Systems ...
doi:10.1201/b19629-16
fatcat:vgv3w7wp4ves5d33es4ztfspom
Secure Energy Efficient Attack Resilient Routing Technique for Zone based Wireless Sensor Network
2020
International Journal of Advanced Computer Science and Applications
Optimization of energy consumption is obligatory for an increased life time of the network. ...
This work proposes a secure energy efficient attack resilient routing technique for zone based wireless sensor network with proactive detection of malicious zones and mitigation from the attacks. ...
Due to Wireless infrastructure, WSNs are prone to various attacks like message drops, message tampering, denial of service through message flooding etc. ...
doi:10.14569/ijacsa.2020.0111267
fatcat:2s6ek2xjlbghtj4md77henmaaq
Arpeggio: A Penetration Attack on Glossy Networks
2016
2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
Glossy networks make use of concurrent transmissions to achieve rapid network flooding in wireless networks with high reliability. They are robust against jamming and header injection attacks. ...
We find that Glossy floods can be hijacked by a packet injection attacker to penetrate into the network and cause severe loss. ...
Wood et al. present several denial-of-service attacks on wireless sensor networks and ways to map the jammed region [11] . ...
doi:10.1109/sahcn.2016.7732971
dblp:conf/secon/HeHV16
fatcat:zzwpyctepbgkhes6lnugmzk7ci
Security and Privacy for Emerging Smart Community Infrastructures
2016
Proceedings of the International Conference on Internet of Things and Big Data
Smart communities of the future have features that make them susceptible to novel forms of cyber-attack and a potential loss of privacy for the citizens they serve. ...
We view these communities as metro level wide area control systems with sensors and actuators located in residences, the workplace, in mobile vehicles and even worn on the body. ...
ACKNOWLEDGEMENTS We wish to acknowledge the generous support of the UC Davis RISE initiative and the NSF SaTC program which funded portions of this work. ...
doi:10.5220/0005929901480155
dblp:conf/iotbd/CoposLRKCK16
fatcat:qedf4c72kndvlgsvntfjdtzb5e
Biometric based Security Solutions for MANET: A Review
2013
International Journal of Computer Network and Information Security
This paper critically reviews and investigates the present biometric based security models works for MANETs, and along with security challenges and direction of further research are proposed. ...
Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communicat ion and to work under vulnerable environ ment. ...
Denial of Service (DoS): These types of threats produced a malicious action with I.J. ...
doi:10.5815/ijcnis.2013.10.07
fatcat:qdew6trqp5cplfylbrsqa2nmiq
« Previous
Showing results 1 — 15 out of 1,308 results