COL-MOD: A New Module to Quantify the Weight of Damage Incurred by Collision Attacks
@article{Malekzadeh2017COLMODAN, title={COL-MOD: A New Module to Quantify the Weight of Damage Incurred by Collision Attacks}, author={Mina Malekzadeh and Moghis Ashrostaghi}, journal={Int. J. Netw. Secur.}, year={2017}, volume={19}, pages={583-592} }
The wireless technology is inherently susceptible to many types of attacks. There are few studies that have investigated the collision attacks. However, to the best of our knowledge, there is no prior work on investigating the consequences of the collision attacks on performance of the wireless networks. Hence, this work proposes a new module specifically for NS2 simulator which is capable of implementing and measuring the impact of the collision attacks on performance of the functional…Â
Figures and Tables from this paper
One Citation
Packet Crafting Tools for Cyber Crime Security Attacks
- Computer ScienceInternational Journal of Computer Applications
- 2020
In this paper, a detailed report on packet crafting as well as various investigating tools related to this type cybercrime is presented.
References
SHOWING 1-10 OF 17 REFERENCES
Experimental Evaluation of Energy-Based Denial-of Service Attacks in Wireless Networks
- Computer Science
- 2007
This paper investigates the energy profile of e-DoS packet flood attacks at the MAC, network, transport, application and physical layers in a real 802.11 wireless testbed and demonstrates a combined eDoS attack on the network card, hard disk and system display that reduces battery lifetime by 25 percent.
Defending Malicious Collision Attacks in Wireless Sensor Networks
- Computer Science2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
- 2010
This paper proposes a distributed scheme that is based on low-cost hardware and can effectively identify the source of a collision attack and shows that correct identification of an adversarial node can be achieved with greater than 85% accuracy.
A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks
- Computer ScienceHandbook of Sensor Networks
- 2004
A DOS attack taxonomy is presented to identify the attacker, his capabilities, the target of the attack, vulnerabilities used, and the end result, and to survey vulnerabilities in WSNs and give possible defenses.
A Novel Framework of Defense System Against DoS Attacks in Wireless Sensor Networks
- Computer Science2011 7th International Conference on Wireless Communications, Networking and Mobile Computing
- 2011
By using this method, most kinds of DoS attacks, such as Jamming, exhaustion, and flooding can be successfully detected and the experimental results show that the method can achieve satisfying result.
Analysing cross layer performance based on Sinking and Collision Behaviour attack in MANET
- Computer Science2012 International Conference on Radar, Communication and Computing (ICRCC)
- 2012
The intrusion detection identifies the detection accuracy by using cross-layer features to define a routing behaviour and tries to find a response system in simulations of the sinking behaviour and collision behaviour attack against network integrity.
A Taxonomy of Internal Attacks in Wireless Sensor Network
- Computer Science
- 2012
The types of internal attacks of WSNs based on OSI model are focused on and some security requirements, characterizers and challenges of W SNs are discussed by which to contribute to the WSN’s security research.
DETECTION AND PREVENTION OF DDOS ATTACK IN MANET ’ S USING DISABLE IP BROADCAST TECHNIQUE
- Computer Science
- 2013
A technique is proposed that can prevent a specific kind of DDoS attack i.e. flood attack which Disable IP Broadcast and the performance of the proposed scheme in a series of simulations shows that it provides a better solution than existing schemes.
Minimization of Collision in Energy Constrained Wireless Sensor Network
- Computer ScienceWirel. Sens. Netw.
- 2009
This paper aims at minimizing the effects of congestion leading to collision in the network by proposing an effective algorithm that can be done by optimizing the size of the contention window by introducing pa-rameters like source count and α.
Taxonomy on Security Attacks on Self Configurable Networks
- Computer Science
- 2014
The security attacks and intrusion detection systems methodology for self configurable networks for mobile wireless networks are discussed.
Efficacy of misuse detection in ad hoc networks
- Computer Science2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004.
- 2004
This paper investigates the placement of the intrusion detection modules for misuse intrusion detection, and proposes a family of algorithms that approximate the optimal solution, and proves that some of these algorithms have guaranteeable approximation ratios.