2015 International Conference on Computing Communication Control and Automation 2015
DOI: 10.1109/iccubea.2015.218
|View full text |Cite
|
Sign up to set email alerts
|

Attacks that Downturn the Performance of Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…A routing attack interferes with the routing process, by sending fake routing information. A sink node attack aims to interrupt/block data transmission between networks by compromising a sink device, while in a black hole attack, the compromised device establishes routing connections with other devices, and next discards received packets, thus leading to a packet loss event [44]. In a flooding attack, the malicious attacker aims at exhausting the resources of network servers through a distributed DoS attack.…”
Section: ) Network Layermentioning
confidence: 99%
“…A routing attack interferes with the routing process, by sending fake routing information. A sink node attack aims to interrupt/block data transmission between networks by compromising a sink device, while in a black hole attack, the compromised device establishes routing connections with other devices, and next discards received packets, thus leading to a packet loss event [44]. In a flooding attack, the malicious attacker aims at exhausting the resources of network servers through a distributed DoS attack.…”
Section: ) Network Layermentioning
confidence: 99%