The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The present work is dedicated to study attacks and contremusure in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a proposal analytical...
Routing is a key factor in the design of modern communication networks, especially in wireless ad-hoc networks (WANs). In WANs, both selfish and malicious nodes are the misbehaving nodes and are significant routing and security problems. The proposed mechanism presents a trust model to detect selfish and malicious nodes to avoid these nodes becoming routing nodes. In addition, the proposed paper provides...
The operation of Ad-hoc networks depends on the cooperation among nodes to provide connectivity and communication routes. However, such an ideal situation may not always be achievable in practice. Some nodes may behave maliciously, resulting in degradation of the performance of the network or even disruption of its operation altogether. To mitigate the effect of such nodes and to achieve higher levels...
MANETs are vulnerable to a number of security threats due to their flexible characteristics such as dynamic topology formation, openness of the wireless medium and resource constraints. Wormhole attack is one of the most sophisticated forms of security threats in MANET wherein two or more colluders silently record packets at one location and then tunnel them to another location in the network. As...
The following topics are dealt with: vehicular networking; beaconing and broadcast; data collection and management; simulation and modelling; transport protocols; mobility management in VANETs; telecommunication security; smart antennas and radio; reliability and routing; cellular networks; physical layer; and MAC.
Low-rate denial-of-service attack is a novel category of DDoS attacks. The paper defines defense performance as metric to analyze whether the degree of distribution of attack sources impacts the LDoS attack greatly. From the result of simulation on NS2, the deeper degree of distributed, the better defense performance of Droptail (passive queue management), and the worse defense performance of RED...
Jamming attack by adversaries is the critical threat in Network Centric Warfare that uses tactical wireless networks. Thus research on developing new networking protocols that are resilient to such attacks are of high importance. Geocasting is a prominent routing mechanism in tactical networks to send critical messages such as alarm about chemical attack, guerrilla detection etc, to the nodes within...
Deployment of wireless sensor networks in sensitive applications such as healthcare, defence, habitat monitoring and early bushfire detection requires a careful consideration. These networks are prone to security attacks due to their wireless and deployment nature. It is very likely that after deployment of the network, sensor nodes are left unattended which causes serious security concerns. Insecure...
Most of the research work has shown that homogeneous ad hoc networks have poor performance, connectivity and scalability. Heterogeneous sensor network (HSN) consists of physically different types of sensor nodes. The feasibility of implementing elliptic curve cryptography (ECC) in HSN is simulated in this approach. It utilizes elliptic curve Diffie-Hellman (ECDH) by using pseudo-random polynomial...
In this paper we present a novel technology named probability dynamic relay handover (PDRH) for the benefit of providing a mechanism to recover from selective attacks on some important terminals of JTIDS. The key points of PDRH are the probability model to simulate selective attacks using the theory of scale-free network and addressing for a new relay node. In simulation based on OPNET Modeler 10...
A wireless ad-hoc network is a collection of mobile nodes that can be deployed without the need for any centralized management infrastructure. The operation of ad-hoc networks depends on the cooperation among nodes to provide connectivity and communication routes. However, such an ideal situation may not always be achievable in practice. Some nodes may behave maliciously, resulting in degradation...
In this paper, we propose a new Dynamic Reputation Evaluation Model (DREM) to meet the requirement of characteristics and security in hierarchical Ad Hoc networks. In this model, the reputation relationship is defined with the consideration of related node roles and functions, and the reputation evaluation mechanism is built based on the correlation among nodes to evaluate and update the reputation...
An opportunistic network is a type of challenged network that has attracted a great deal of attention in recent years. While a number of schemes have been proposed to facilitate data dissemination in opportunistic networks, there is an implicit assumption that each participating peer behaves collaboratively. Consequently, these schemes may be vulnerable if there are uncooperative or malicious peers...
The sensor nodes in a wireless sensor network (WSN) are typically characterized by limited power supply, low bandwidth, small memory sizes and limited energy, leading to a very demanding environment to provide security. In this paper, we propose a protocol named fuzzy logic-based energy efficient packet loss preventive routing protocol (FEEPRP) that adopts a routing algorithm which imparts security...
In data-centric wireless sensor networks (WSN), the malicious nodes may drop some crucial data packets, which serious destroy the network's data collection and decrease the availability of sensor services. In this paper, we present a lightweight security scheme based on polynomial modeling for preventing selective forwarding attacks. Both theoretical analysis and simulations show that the proposed...
With the deployment of sensor network applications there is lot of breakthrough in digital or smart sensor designs. These smart sensors have a dedicated processor which allows interfacing to many sensors which measure ambient readings of temperature, pressure and humidity of the environment. These sensors once calibrated they function independently running using a self-powered battery which operates...
Though the security of wireless sensor networks (WSNs) has been studied deeply, the inside attacks still are very difficult to defend. The inside attacks are not detectable with only the classic cryptographic techniques and the attacks mainly include two types of attack: exceptional message attack and abnormal behavior attack. In this paper, we present an inside attacker detection approach, which...
This paper addressed the difficulties and challenges facing the wireless sensor networks on the battlefield cased by misdirection attack. WSNs is often vulnerable to attackerpsilas either in the routing or forwarding data and attempt to consume a lot of energy by sending a large quantity of useless packets. The main objective of the intruder is to misdirect the incoming messages to increase the latency,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.