Ssu et al., 2007 - Google Patents
Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networksSsu et al., 2007
- Document ID
- 12034340058240815370
- Author
- Ssu K
- Chou C
- Cheng L
- Publication year
- Publication venue
- Computer Communications
External Links
Snippet
Recently, security issues in wireless sensor networks become more important. Many mechanisms have been proposed for solving varying types of malicious attacks. However, few of them discussed malicious packet-modifying attacks (MPA). The MPA come from some …
- 238000000034 method 0 title description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/246—Connectivity information discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/12—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
- H04W40/14—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/48—Routing tree calculation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Madria et al. | SeRWA: A secure routing protocol against wormhole attacks in sensor networks | |
Khalil et al. | UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks | |
Han et al. | Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks | |
Avancha et al. | Security for wireless sensor networks | |
Heurtefeux et al. | Enhancing RPL resilience against routing layer insider attacks | |
Dwivedi et al. | Detection and prevention analysis of wormhole attack in wireless sensor network | |
Aryai et al. | Cross layer approach for detection and prevention of Sinkhole Attack using a mobile agent | |
Ssu et al. | Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks | |
Terence | Secure route discovery against wormhole attacks in sensor networks using mobile agents | |
Datema | A case study of wireless sensor network attacks | |
CN113301571A (en) | Strong defense method for malicious node attack in wireless sensor network | |
Saghar et al. | Formal modelling of a robust wireless sensor network routing protocol | |
Virada | Intrusion detection system (IDS) for secure MANETs: a study | |
Jamshidi et al. | DSLA: Defending against selective forwarding attack in wireless sensor networks using learning automaton | |
Nghiem et al. | A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks | |
Brar et al. | Review on grey-hole attack detection and prevention | |
Anusas-Amornkul | On detection mechanisms and their Performance for packet dropping Attack in ad hoc networks | |
Garg et al. | A literature survey of black hole attack on aodv routing protocol | |
Labraoui et al. | RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless... | |
Garg et al. | Comprehensive study on MANETs network layer attacks | |
Alajmi et al. | Selective forwarding detection (SFD) in wireless sensor networks | |
Saghar | Formal modelling and analysis of denial of services attacks in wireless sensor networks | |
Sofi et al. | Securing Ad Hoc wireless sensor networks under byzantine attacks by implementing non-cryptographic methods | |
Nivedita et al. | Trust Management-Based Service Recovery and Attack Prevention in MANET. | |
Fabrice et al. | DETECTIONAND PREVENTIONOF MALICIOUS NODE BASED ON NODE BEHAVIOUR IN MANET. |