Port Change Attack in Wireless Ad Hoc Networks

被引:0
|
作者
Vishnu, K. [1 ]
Jain, Mohit [2 ]
Jain, Shalini [2 ]
机构
[1] MNNIT, CSE, Allahabad, Uttar Pradesh, India
[2] Guru Gobind Singh Indraprastha Univ, Maharaja Surajmal Inst Technol, Dept Informat Technol, New Delhi, India
关键词
Component; Ad hoc Networks; Routing; Port Scan Attack; TCP/UDP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad hoc networks are mostly used in places where providing a network infrastructure seems difficult. In an Ad hoc network the nodes are free to move around and may join and leave the network at their wish. Due to this feature of freedom and unconstrained mobility it is prone to many security related issues. In this paper we present a new idea for a Transport layer attack.
引用
收藏
页码:146 / 148
页数:3
相关论文
共 50 条
  • [41] Flooding attack and defence in Ad hoc networks
    Yi, Ping
    Hou, Yafei
    Zhong, Yiping
    Zhang, Shiyong
    Dai, Zhoulin
    Journal of Systems Engineering and Electronics, 2006, 17 (02) : 410 - 416
  • [42] An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks
    Gunhee Lee
    Wonil Kim
    Kangseok Kim
    Sangyoon Oh
    Dong-kyoo Kim
    Peer-to-Peer Networking and Applications, 2015, 8 : 684 - 693
  • [43] Detection of Selective Forwarding Attack in Wireless Ad hoc Networks using Binary Search
    Mukherjee, Saswati
    Chattopadhyay, Matangini
    Chattopadhyay, Samiran
    Bose, Prince
    Bakshi, Agniswar
    2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2012, : 382 - 386
  • [44] Detecting Black Hole Attack in Wireless Ad Hoc Networks Based On Learning Automata
    Soleimani, Mohammad Taqi
    Ghasemi, Abdorasoul
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 514 - 519
  • [45] An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks
    Lee, Gunhee
    Kim, Wonil
    Kim, Kangseok
    Oh, Sangyoon
    Kim, Dong-kyoo
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 684 - 693
  • [46] Side channel monitoring: Packet drop attack detection in wireless ad hoc networks
    Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON N2L 3G1, Canada
    IEEE Int Conf Commun, 2011,
  • [47] Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack
    Tselikis, C.
    Mitropoulos, S.
    Komninos, N.
    Douligeris, C.
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (05) : 619 - 621
  • [48] Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks
    Yun, Ji-Hoon
    Park, Min-Ho
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 72 (04) : 2519 - 2532
  • [49] Accountability for wireless LANs ad hoc networks and wireless mesh networks
    Xiao, Yang
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 116 - 126
  • [50] Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks
    Heydari V.
    Yoo S.-M.
    International Journal of Wireless Information Networks, 2018, 25 (1) : 15 - 29