Sciweavers

138 search results - page 1 / 28
» Packet forwarding with source verification
Sort
View
CN
2008
100views more  CN 2008»
13 years 4 months ago
Packet forwarding with source verification
Abstract-- Routers in the Internet do not perform any verification of the source IP address contained in the packets, leading to the possibility of IP spoofing. The lack of such ve...
Craig A. Shue, Minaxi Gupta, Matthew P. Davy
IPPS
2006
IEEE
13 years 10 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
ICCNMC
2005
Springer
13 years 10 months ago
Curve-Based Greedy Routing Algorithm for Sensor Networks
Routing packets along a specified curve is a new approach to forwarding packets in large-scale dense sensor networks. Forwarding packets along trajectories can be very effective in...
Jin Zhang, Yaping Lin, Mu Lin, Ping Li, Si-wang Zh...
INFOCOM
2012
IEEE
11 years 7 months ago
Transparent acceleration of software packet forwarding using netmap
—Software packet forwarding has been used for a long time in general purpose operating systems. While interesting for prototyping or on slow links, it is not considered a viable ...
Luigi Rizzo, Marta Carbone, Gaetano Catalli
CCS
2007
ACM
13 years 8 months ago
Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach
Defending against denial-of-service (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish. In this paper, we propos...
Xiaoxin Wu, David K. Y. Yau