Multicast-specific security threats and counter-measures

Author(s):  
T. Ballardie ◽  
J. Crowcroft
Author(s):  
Alekha Kumar Mishra

Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.


2021 ◽  
Author(s):  
Mohammad Kamrul Hasan ◽  
Taher M. Ghazel ◽  
Rashid A. Saeed ◽  
Bishwajeet Pandey ◽  
Hardik Gohel ◽  
...  

2020 ◽  
Vol 23 (3) ◽  
pp. 2047-2065 ◽  
Author(s):  
Yazdan Ahmad Qadri ◽  
Rashid Ali ◽  
Arslan Musaddiq ◽  
Fadi Al-Turjman ◽  
Dae Wan Kim ◽  
...  

IJARCCE ◽  
2014 ◽  
pp. 8604-8607
Author(s):  
ER.KAUSHIK ADHIKARY ◽  
ER.VINEET MEHAN ◽  
ER.AMANDEEP SINGH BHATIA

2020 ◽  
Vol 8 (5) ◽  
pp. 1790-1798

Analysis of security threats and examining of existing mitigation techniques are considered as the major dimensions that need to be focused by next-generation cloud technology. These securities and privacy-based challenges are affecting most of the quality services and online data storage having huge network infrastructures and applications for information management. However, still the variant advantages are the success key of emerging cloud, but poses new security issues and reliability challenges for the users and their service applications. The main concern is an application-based cloud threats, which are not tracked properly and no user action logs are maintained for the evidences. This specially leads to the forging of identifications and manipulation in system actions. Nowadays the most common action observed by malicious attacker is to execute repudiation, where one of the parties involved in communication, denies that actually they have executed the particular conduct. Repudiation attack leads to the major legal actions on massive financial losses, which are not even legitimately proved due to the lack of evidences. Thus, the paper presents a broad indication of repudiation attack through analysis of prior security issues in a cloud environment. Wide-ranging reviews on the same have been presented. The study has tried to figure out the root cause of repudiation attack in order to come up with more suitable and satisfactory counter measures. The study also focuses on a variety of dimensions for future research study in the domain of repudiation based on the previous published works and industry /organization reports.


Sign in / Sign up

Export Citation Format

Share Document