The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Probabilistic routing protocols in Delay Tolerant Networks (DTN) make use of the mobility history in its prediction when making a forwarding decision. However, the predictive property can expose DTN to more advanced security threats. One security threat is enhanced flooding attack which can be more penetrative if properly planned as malicious nodes have prior knowledge of their victims. However, through...
The Voice over IP (VoIP) application utilizes the Internet to provide voice service; thus it is susceptible to various security issues common on the IP networks, such as the flooding attack. Moreover, VoIP uses the Session Initiation Protocol (SIP) for session control and management. The transactional nature of SIP makes flooding attack an even severer threat, which can consequentially lead to denial...
A novel approach for IP traceback is proposed, which combines probabilistic packet marking and network coding techniques. Dissimilar to prior PPM schemes, our approach stores random linear combinations of router labels instead of overwriting to further decrease the convergence time for attack path reconstruction. Based on the coupon collector problem with unequal probability, we also present accurate...
A novel authenticated packet marking scheme for IP trace-back is proposed in this paper, it is based on the probabilistic packet marking scheme developed by Savage, et a. The new scheme adopts a new dynamic probability value sequence to mark packets and uses the IP capital checksum to check the marked information. Compared with PPM scheme, The new scheme doesn't need the topology and it improves a...
A mobile ad hoc network is a network without any infrastructure or service access points. In wireless ad hoc networks, the performance of the media access control (MAC) protocol has significant impact on the overall network performance. In contention-based MAC protocols, nodes' access to the shared channel is not synchronized, and they contend for the channel whenever there are packets in their buffers...
The growing popularity of the 802.11-based Wireless LAN (WLAN) also increases its risk of security attacks. This paper presents an analysis and solution to two Denial of Service (DoS) attacks: Deauthentication flooding (DeauthF) and disassociation flooding (DisassF) attacks. We conducted experiments to understand the impact of the attacks, and applied the Markov chain model to study the transition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.