Essays about: "blackhole"

Found 5 essays containing the word blackhole.

  1. 1. Implementing and evaluating variations of the Blackhole attack on RPL

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Adam Pettersson; [2022]
    Keywords : ;

    Abstract : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. READ MORE

  2. 2. Blackhole Attack Detection in Low-Power IoT Mesh Networks Using Machine Learning Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Hossein Keipour; [2022]
    Keywords : IoT; 6LoWPAN; RPL; Intrusion Detection System; Machine Learning;

    Abstract : Low-Power Lossy Networks (LLNs) are a type of Internet of Things (IoT) meshnetwork that collaboratively interact and perform various tasks autonomously. TheRouting Protocol for Low-power and Lossy Network (RPL) is the most used rout-ing protocol for LLNs. READ MORE

  3. 3. Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level

    University essay from Akademin för innovation, design och teknik

    Author : Daniel Karlström; [2012]
    Keywords : pmacct; statistical analysis; bgp; peer; peering; routing; route; quagga; virtual router; virtual; router; linux; graph; graphing; mrtg; database; mysql; script; scripting; python; bash; libpcap; mdh; data collection; data; collection; collecting; ISP; internet service provider; DoS; DDoS; attack; pmacct; statistisk analys; bgp; peer; peering; peera; routing; route; quagga; virtuell router; virtuell; router; linux; graf; grafa; mrtg; databas; mysql; script; scripting; python; bash; libpcap; mdh; datainsamling; insamling; data; ISP; internetleverantör; DoS; DDoS; attack;

    Abstract : Defending against Dos- and DDoS attacks is difficult to accomplish; finding and filtering out illegitimate traffic from the legitimate flow is near impossible. Taking steps to mitigate or even block the traffic can only be done once the IP addresses of the attackers are known. READ MORE

  4. 4. An Analysis of Collaborative Attacks on Mobile Ad hoc Networks

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Cong Hoan Vu; Adeyinka Soneye; [2009]
    Keywords : MANET; Collaborative Attacks; Multiple Node; Blackhole;

    Abstract : A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. READ MORE

  5. 5. Security Threats in Mobile Ad Hoc Network

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : Kamanashis Biswas; Md. Liakat Ali; [2007]
    Keywords : MANET; blackhole; wormhole; DoS; routing; TCP ACK storm; backoff scheme;

    Abstract : Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. READ MORE