Sciweavers

46 search results - page 8 / 10
» An Examination of the Security of Routing Protocol Updates
Sort
View
MINENET
2006
ACM
13 years 11 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
CN
2008
128views more  CN 2008»
13 years 5 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
CORR
2011
Springer
536views Education» more  CORR 2011»
13 years 9 days ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 5 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa
USS
2004
13 years 6 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson