[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ssu et al., 2007 - Google Patents

Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks

Ssu et al., 2007

Document ID
12034340058240815370
Author
Ssu K
Chou C
Cheng L
Publication year
Publication venue
Computer Communications

External Links

Snippet

Recently, security issues in wireless sensor networks become more important. Many mechanisms have been proposed for solving varying types of malicious attacks. However, few of them discussed malicious packet-modifying attacks (MPA). The MPA come from some …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/12Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
    • H04W40/14Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/48Routing tree calculation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications

Similar Documents

Publication Publication Date Title
Madria et al. SeRWA: A secure routing protocol against wormhole attacks in sensor networks
Khalil et al. UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
Han et al. Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks
Avancha et al. Security for wireless sensor networks
Heurtefeux et al. Enhancing RPL resilience against routing layer insider attacks
Dwivedi et al. Detection and prevention analysis of wormhole attack in wireless sensor network
Aryai et al. Cross layer approach for detection and prevention of Sinkhole Attack using a mobile agent
Ssu et al. Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks
Terence Secure route discovery against wormhole attacks in sensor networks using mobile agents
Datema A case study of wireless sensor network attacks
CN113301571A (en) Strong defense method for malicious node attack in wireless sensor network
Saghar et al. Formal modelling of a robust wireless sensor network routing protocol
Virada Intrusion detection system (IDS) for secure MANETs: a study
Jamshidi et al. DSLA: Defending against selective forwarding attack in wireless sensor networks using learning automaton
Nghiem et al. A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks
Brar et al. Review on grey-hole attack detection and prevention
Anusas-Amornkul On detection mechanisms and their Performance for packet dropping Attack in ad hoc networks
Garg et al. A literature survey of black hole attack on aodv routing protocol
Labraoui et al. RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless...
Garg et al. Comprehensive study on MANETs network layer attacks
Alajmi et al. Selective forwarding detection (SFD) in wireless sensor networks
Saghar Formal modelling and analysis of denial of services attacks in wireless sensor networks
Sofi et al. Securing Ad Hoc wireless sensor networks under byzantine attacks by implementing non-cryptographic methods
Nivedita et al. Trust Management-Based Service Recovery and Attack Prevention in MANET.
Fabrice et al. DETECTIONAND PREVENTIONOF MALICIOUS NODE BASED ON NODE BEHAVIOUR IN MANET.