Port Change Attack in Wireless Ad Hoc Networks

被引:0
|
作者
Vishnu, K. [1 ]
Jain, Mohit [2 ]
Jain, Shalini [2 ]
机构
[1] MNNIT, CSE, Allahabad, Uttar Pradesh, India
[2] Guru Gobind Singh Indraprastha Univ, Maharaja Surajmal Inst Technol, Dept Informat Technol, New Delhi, India
关键词
Component; Ad hoc Networks; Routing; Port Scan Attack; TCP/UDP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad hoc networks are mostly used in places where providing a network infrastructure seems difficult. In an Ad hoc network the nodes are free to move around and may join and leave the network at their wish. Due to this feature of freedom and unconstrained mobility it is prone to many security related issues. In this paper we present a new idea for a Transport layer attack.
引用
收藏
页码:146 / 148
页数:3
相关论文
共 50 条
  • [1] Increasing attack resiliency of wireless ad hoc and sensor networks
    Vogt, H
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 179 - 184
  • [2] Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks
    Tamilselvan, Latha
    Sankaranarayanan, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03): : 118 - 123
  • [3] An approach to mitigate wormhole attack in wireless ad hoc networks
    Lee, Gunhee
    Kim, Dong-kyoo
    Seo, Jungtaek
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 220 - +
  • [4] Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [5] Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) : 736 - 745
  • [6] Defending Method Against Jamming Attack in Wireless Ad Hoc Networks
    Ben-Othman, Jalel
    Hamieh, Ali
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 758 - 762
  • [7] A new kind of Transport Layer attack in Wireless Ad Hoc Networks
    Mnnit, Vishnu K.
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 198 - 201
  • [8] A study of on-off attack models for wireless ad hoc networks
    Perrone, L. Felipe
    Nelson, Samuel C.
    2006 1ST WORKSHOP ON OPERATOR-ASSISTED (WIRELESS MESH) COMMUNITY NETWORKS, 2006, : 58 - 67
  • [9] Survey on sybil attack defense mechanisms in wireless ad hoc networks
    Vasudeva, Amol
    Sood, Manu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 120 : 78 - 118
  • [10] Solution to prevent rushing attack in wireless mobile ad hoc networks
    Tarnilselvan, Latha
    Sankaranarayanan, V.
    2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 40 - +