• Corpus ID: 6536137

COL-MOD: A New Module to Quantify the Weight of Damage Incurred by Collision Attacks

@article{Malekzadeh2017COLMODAN,
  title={COL-MOD: A New Module to Quantify the Weight of Damage Incurred by Collision Attacks},
  author={Mina Malekzadeh and Moghis Ashrostaghi},
  journal={Int. J. Netw. Secur.},
  year={2017},
  volume={19},
  pages={583-592}
}
The wireless technology is inherently susceptible to many types of attacks. There are few studies that have investigated the collision attacks. However, to the best of our knowledge, there is no prior work on investigating the consequences of the collision attacks on performance of the wireless networks. Hence, this work proposes a new module specifically for NS2 simulator which is capable of implementing and measuring the impact of the collision attacks on performance of the functional… 
Packet Crafting Tools for Cyber Crime Security Attacks
TLDR
In this paper, a detailed report on packet crafting as well as various investigating tools related to this type cybercrime is presented.

References

SHOWING 1-10 OF 17 REFERENCES
Experimental Evaluation of Energy-Based Denial-of Service Attacks in Wireless Networks
TLDR
This paper investigates the energy profile of e-DoS packet flood attacks at the MAC, network, transport, application and physical layers in a real 802.11 wireless testbed and demonstrates a combined eDoS attack on the network card, hard disk and system display that reduces battery lifetime by 25 percent.
Defending Malicious Collision Attacks in Wireless Sensor Networks
TLDR
This paper proposes a distributed scheme that is based on low-cost hardware and can effectively identify the source of a collision attack and shows that correct identification of an adversarial node can be achieved with greater than 85% accuracy.
A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks
TLDR
A DOS attack taxonomy is presented to identify the attacker, his capabilities, the target of the attack, vulnerabilities used, and the end result, and to survey vulnerabilities in WSNs and give possible defenses.
A Novel Framework of Defense System Against DoS Attacks in Wireless Sensor Networks
TLDR
By using this method, most kinds of DoS attacks, such as Jamming, exhaustion, and flooding can be successfully detected and the experimental results show that the method can achieve satisfying result.
Analysing cross layer performance based on Sinking and Collision Behaviour attack in MANET
TLDR
The intrusion detection identifies the detection accuracy by using cross-layer features to define a routing behaviour and tries to find a response system in simulations of the sinking behaviour and collision behaviour attack against network integrity.
A Taxonomy of Internal Attacks in Wireless Sensor Network
TLDR
The types of internal attacks of WSNs based on OSI model are focused on and some security requirements, characterizers and challenges of W SNs are discussed by which to contribute to the WSN’s security research.
DETECTION AND PREVENTION OF DDOS ATTACK IN MANET ’ S USING DISABLE IP BROADCAST TECHNIQUE
TLDR
A technique is proposed that can prevent a specific kind of DDoS attack i.e. flood attack which Disable IP Broadcast and the performance of the proposed scheme in a series of simulations shows that it provides a better solution than existing schemes.
Minimization of Collision in Energy Constrained Wireless Sensor Network
TLDR
This paper aims at minimizing the effects of congestion leading to collision in the network by proposing an effective algorithm that can be done by optimizing the size of the contention window by introducing pa-rameters like source count and α.
Taxonomy on Security Attacks on Self Configurable Networks
TLDR
The security attacks and intrusion detection systems methodology for self configurable networks for mobile wireless networks are discussed.
Efficacy of misuse detection in ad hoc networks
  • D. Subhadrabandhu, S. Sarkar, F. Anjum
  • Computer Science
    2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004.
  • 2004
TLDR
This paper investigates the placement of the intrusion detection modules for misuse intrusion detection, and proposes a family of algorithms that approximate the optimal solution, and proves that some of these algorithms have guaranteeable approximation ratios.
...
1
2
...