2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) 2017
DOI: 10.1109/compsac.2017.208
|View full text |Cite
|
Sign up to set email alerts
|

Securing Link State Routing for Wireless Networks against Byzantine Attacks: A Monitoring Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…In our research, we proposed the monitoring approach to secure the link state routing protocol against Byzantine attacks [2]. This paper differs from our previous paper in which we only highlight the security goals our proposed monitoring approach achieves.…”
Section: Introductionmentioning
confidence: 56%
“…In our research, we proposed the monitoring approach to secure the link state routing protocol against Byzantine attacks [2]. This paper differs from our previous paper in which we only highlight the security goals our proposed monitoring approach achieves.…”
Section: Introductionmentioning
confidence: 56%
“…Numerous studies have focused on attacks targeting different layers of IoT systems and have proposed corresponding countermeasures [74][75][76][77]. At the physical and data-link layers, denial-of-service (DoS) assaults are among the most prevalent dangers.…”
Section: Attacks On Physical and Data-link Layersmentioning
confidence: 99%
“…In these assaults, rogue devices reduce the nodes' processing power to turn off the system. The most common techniques used in DoS assaults include jamming, collision, exhaustion, and unfairness [77]. While tinkering, DoS assaults include physically altering sensor nodes, such as wiring on the electrical board or joining cables and buzzing.…”
Section: Attacks On Physical and Data-link Layersmentioning
confidence: 99%
See 2 more Smart Citations