Port Change Attack in Wireless Ad Hoc Networks

被引:0
|
作者
Vishnu, K. [1 ]
Jain, Mohit [2 ]
Jain, Shalini [2 ]
机构
[1] MNNIT, CSE, Allahabad, Uttar Pradesh, India
[2] Guru Gobind Singh Indraprastha Univ, Maharaja Surajmal Inst Technol, Dept Informat Technol, New Delhi, India
关键词
Component; Ad hoc Networks; Routing; Port Scan Attack; TCP/UDP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad hoc networks are mostly used in places where providing a network infrastructure seems difficult. In an Ad hoc network the nodes are free to move around and may join and leave the network at their wish. Due to this feature of freedom and unconstrained mobility it is prone to many security related issues. In this paper we present a new idea for a Transport layer attack.
引用
收藏
页码:146 / 148
页数:3
相关论文
共 50 条
  • [31] Robust wireless ad hoc networks
    Li, XY
    Wang, Y
    Wan, PJ
    Yi, CW
    Frieder, O
    2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 453 - 457
  • [32] Management of Wireless Ad Hoc Networks and Wireless Sensor Networks
    Mehmet Ulema
    Jose Marcos Nogueira
    Barcin Kozbe
    Journal of Network and Systems Management, 2006, 14 : 327 - 333
  • [33] Management of wireless ad hoc networks and wireless sensor networks
    Ulema, Mehmet
    Nogueira, Jose Marcos
    Kozbe, Barcin
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2006, 14 (03) : 327 - 333
  • [34] Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
    Poongodi, T.
    Khan, Mohammed S.
    Patan, Rizwan
    Gandomi, Amir H.
    Balusamy, Balamurugan
    IEEE ACCESS, 2019, 7 : 18409 - 18419
  • [35] Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks
    Li, Xu
    Lu, Rongxing
    Liang, Xiaohui
    Shen, Xuemin
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [36] Flooding attack and defence in Ad hoc networks
    Yi Ping~1
    2. Dept. of Computing and Information Technology
    3. Graduate School of Engineering
    Journal of Systems Engineering and Electronics, 2006, (02) : 410 - 416
  • [37] Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
    Mandala, Satria
    Ngadi, Md Asri
    Sharif, Johan Mohamad
    Zahid, M. Soperi Mohd
    Mohamed, Farhan
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 296 - 305
  • [38] An end-to-end detection of wormhole attack in wireless ad-hoc networks
    Wang, Xia
    Wong, Johnny
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 39 - +
  • [39] Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks
    Ji-Hoon Yun
    Min-Ho Park
    Wireless Personal Communications, 2013, 72 : 2519 - 2532
  • [40] Circumventing sinkhole attack in ad hoc networks
    Rana, Khurram Gulzar
    Yongquan, Cai
    Ditta, Allah
    Azeem, Muhammad
    Qasim, Muhammad
    International Journal of Wireless and Mobile Computing, 2015, 9 (04) : 363 - 369