首页> 外文会议>Advanced computing, networking and security. >Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network
【24h】

Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network

机译:无线网状网络中蠕虫,水母和拜占庭攻击的入侵检测技术

获取原文
获取原文并翻译 | 示例

摘要

Wireless Mesh Networks (WMNs) have emerging application because of its ad-hoc features, high internet bandwidth capability, and interoperable with various networks. However, all features of WMNs vulnerable due to their inadequate security services, and most of the existing techniques protect WMNs from single adversary node, but failed to protect colluding attacks. We proposed new Intrusion Detection (ID) technique, to protect the WMNs from wormhole attack (colluding attack) and following jellyfish and byzantine attacks. The proposed ID technique works based on different delays such as initial end-to-end packet delay, average end-to-end packet delay, and worst case end-to-end packet delay because wormhole attackers attract the network nodes by sending lower latency. Eventually, simulation results show that, our ID technique improves throughput of the network, when source and destination nodes detect and isolate (select new path which does not contain adversaries) the adversaries in wormhole attack and its following attacks.
机译:无线网状网络(WMN)由于其特有功能,高Internet带宽能力以及可与各种网络互操作而得到了新兴应用。但是,由于WMN的安全服务不足,其所有功能都容易受到攻击,并且大多数现有技术可保护WMN免受单个对手节点的攻击,但无法保护共谋攻击。我们提出了一种新的入侵检测(ID)技术,以保护WMN免受虫洞攻击(有冲突的攻击)以及随后的水母和拜占庭攻击。提出的ID技术基于不同的延迟工作,例如初始端到端数据包延迟,平均端到端数据包延迟和最坏情况的端到端数据包延迟,因为蠕虫攻击者通过发送较低的延迟来吸引网络节点。最终,仿真结果表明,当源节点和目标节点检测并隔离(选择不包含对手的新路径)蠕虫攻击及其后续攻击中的对手时,我们的ID技术可以提高网络的吞吐量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号