Opportunistic networks (OppNets) are an interesting topic that are seen to have a promising future. Many protocols have been developed to accommodate the features of OppNets such as frequent partitions, long delays, and no end-to-end path between the source and destination nodes. Embedding security into these protocols is challenging and has taken a lot of attention in research. One of the attacks that OppNets are exposed to is the packet dropping attack, where the malicious node attempts to drop some packets and forwards an incomplete number of packets which results in the distortion of the message. To increase the security levels in OppNets, this paper presents an algorithm developed to detect packet dropping attacks, and finds the malici...
Abstract: This paper describes a mechanism for detecting malicious packet dropping carried out by bo...
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment....
We consider the problem of detecting whether a compromised router is maliciously manipulating its st...
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, su...
Security is a major challenge in Opportunistic Networks (OppNets) due to its characteristics o...
Opportunistic Networks aim to set a reliable networks where the nodes has no end-To-end connection a...
Security is a major challenge in Opportunistic Networks because of its characteristics, such as open...
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, su...
Opportunistic Networks (OppNets) are exposed to a variety of attacks, among them are packet dropping...
Ad hoc networking has received considerable attention in the research community for seamless communi...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
Among various types of denial of service attacks, “dropping attack ” is probably the most difficult ...
We build up an effective algorithm for detection of selective packet drops made by insider attackers...
Abstract—MANET is a temporary network for a specified work and with the enormous growth MANETs it is...
In most wireless sensor networks (WSNs), sensor nodes generate data packets and send them to the bas...
Abstract: This paper describes a mechanism for detecting malicious packet dropping carried out by bo...
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment....
We consider the problem of detecting whether a compromised router is maliciously manipulating its st...
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, su...
Security is a major challenge in Opportunistic Networks (OppNets) due to its characteristics o...
Opportunistic Networks aim to set a reliable networks where the nodes has no end-To-end connection a...
Security is a major challenge in Opportunistic Networks because of its characteristics, such as open...
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, su...
Opportunistic Networks (OppNets) are exposed to a variety of attacks, among them are packet dropping...
Ad hoc networking has received considerable attention in the research community for seamless communi...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
Among various types of denial of service attacks, “dropping attack ” is probably the most difficult ...
We build up an effective algorithm for detection of selective packet drops made by insider attackers...
Abstract—MANET is a temporary network for a specified work and with the enormous growth MANETs it is...
In most wireless sensor networks (WSNs), sensor nodes generate data packets and send them to the bas...
Abstract: This paper describes a mechanism for detecting malicious packet dropping carried out by bo...
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment....
We consider the problem of detecting whether a compromised router is maliciously manipulating its st...