Thesis Wireless Security

Thesis Wireless Security-43
Some examples of routing attacks are: black hole, 9gray hole, wormhole, rushing attack, and frame-up [{7].For example, the at- tackers can create a wormhole through collusion in the network to short circuit the normal °ow of routing packets [5], or can apply rushing attack to disseminate route request quickly through the network [6].

Some examples of routing attacks are: black hole, 9gray hole, wormhole, rushing attack, and frame-up [{7].For example, the at- tackers can create a wormhole through collusion in the network to short circuit the normal °ow of routing packets [5], or can apply rushing attack to disseminate route request quickly through the network [6]. Google(); req('single_work'); $('.js-splash-single-step-signup-download-button').one('click', function(e){ req_and_ready('single_work', function() ); new c.

Tags: Write Good Conclusion English EssayThesis Statement Literary EssayGood Comparison EssaysAbortion Persuasive Speech Pro-LifeSupersize Me Essay SummaryEssays About Money And Happiness

This can be achieved by applying necessary access con- trol and authentication , such as secure key distribution and secure neighbor discovery , etc.

For example, Zhou and Haas investigated distributed certi¯cate authorities in ad hoc networks using threshold cryptogra- phy [0]. developed the idea of self-organized public-key infras- tructure similar to PGP in the sense that public-key certi¯cates are issued by the users [,].

In wireless ad hoc networks, since all nodes share the common communication medium, attackers can easily launch a variety of attacks ranging from passive eavesdropping from active interfering.

For example, a simple and straight-forward attack is jamming attack, where attackers can disrupt the other nodes’ normal communications by introducing interferences.

uses cookies to personalize content, tailor ads and improve the user experience.

By using our site, you agree to our collection of information through the use of cookies. In other words, they have focused on defending against outside attackers.In ad hoc networks, due to the loose ac- cess control and weak physical protection, insider attackers can be very common.By using some spreading codes only known to the communicating peers, nodes have created a secret channel among them.Recently, several new approaches have also been proposed to handle jamming attacks in a more e±cient way, such as those proposed in [0, 55, 8, 8, 8].The di®erence with PGP is that in their system, certi¯cates are stored and distributed by the users. have also discussed how to build security associations with the help of mobility in mobile ad hoc networks [].Since in ad hoc network nodes relies on each other to forward packets, routing has become one of the most active research topics during the last decade, and various routing protocols have been proposed, such as DSR [7, 8], AODV [70], OLSR [5], and TBRPF [6].Various schemes have been proposed to handle jamming attack in the literature.One way to handle jamming attack is to design robust physical layer technologies, such as spread spectrum, which are resistant to RF jamming [7, 7, 77].In this dissertation we will not focus on jamming attack, and will assume that some 8existing schemes, such as those proposed in [7,8], have been employed to address such attacks.Besides physical layer attacks, attackers can also try to interrupt the normal Medium Access Control (MAC) layer behaviors, such as described in .

SHOW COMMENTS

Comments Thesis Wireless Security

The Latest from gbo33.ru ©