Port Change Attack in Wireless Ad Hoc Networks

被引:0
作者
Vishnu, K. [1 ]
Jain, Mohit [2 ]
Jain, Shalini [2 ]
机构
[1] MNNIT, CSE, Allahabad, Uttar Pradesh, India
[2] Guru Gobind Singh Indraprastha Univ, Maharaja Surajmal Inst Technol, Dept Informat Technol, New Delhi, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2010年 / 10卷 / 08期
关键词
Component; Ad hoc Networks; Routing; Port Scan Attack; TCP/UDP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad hoc networks are mostly used in places where providing a network infrastructure seems difficult. In an Ad hoc network the nodes are free to move around and may join and leave the network at their wish. Due to this feature of freedom and unconstrained mobility it is prone to many security related issues. In this paper we present a new idea for a Transport layer attack.
引用
收藏
页码:146 / 148
页数:3
相关论文
共 50 条
  • [31] Wireless ad hoc networks and related topologies: applications and research challenges
    Toumpis, S.
    Toumpakaris, D.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2006, 123 (06): : 232 - 241
  • [32] Reliable Routing in Wireless Ad Hoc Networks: The Virtual Routing Protocol
    Luiz Carlos P. Albini
    Antonio Caruso
    Stefano Chessa
    Piero Maestrini
    Journal of Network and Systems Management, 2006, 14 : 335 - 358
  • [33] Transmit power distribution of wireless ad hoc networks with topology control
    Avidor, Dan
    Mukherjee, Sayandev
    Onat, Furuzan Atay
    INFOCOM 2007, VOLS 1-5, 2007, : 46 - +
  • [34] Private Logical Neighborhoods for Wireless Ad Hoc Networks
    Sivakumar, Kulasekaran
    Ramkumar, Mahalingam
    Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 73 - 79
  • [35] Random power control in wireless ad hoc networks
    Kim, TS
    Kim, SL
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (12) : 1046 - 1048
  • [36] Anonymity enabling scheme for wireless ad hoc networks
    Boukerche, A
    El-Khatib, K
    Xu, L
    Korba, L
    GLOBECOM 2004: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE WORKSHOPS, 2004, : 136 - 140
  • [37] Routing with guaranteed delivery in ad hoc wireless networks
    Bose, P
    Morin, P
    Stojmenovic, I
    Urrutia, J
    WIRELESS NETWORKS, 2001, 7 (06) : 609 - 616
  • [38] Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks
    Michalas, Antonis
    Komninos, Nikos
    Prasad, Neeli R.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2011, 3 (01) : 14 - 36
  • [39] An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks
    de Andres, David
    Friginal, Jesus
    Ruiz, Juan-Carlos
    Gil, Pedro
    IEEE 15TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2009, : 228 - 233
  • [40] Deterministic Digital Clustering of Wireless Ad Hoc Networks
    Jurdzinski, Tomasz
    Kowalski, Dariusz R.
    Rozanski, Michal
    Stachowiak, Grzegorz
    PODC'18: PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2018, : 105 - 114