drop attack
Recently Published Documents


TOTAL DOCUMENTS

44
(FIVE YEARS 12)

H-INDEX

5
(FIVE YEARS 2)

Author(s):  
Kareti Madhava Rao ◽  
◽  
S Ramakrishna

Because of the great characteristics of Wireless Sensor Networks like easier to use and less cost of deployment, they have attracted the researchers to conduct the investigations and received the importance in various civilian and military applications. A number of security attacks have been involved due to the lack of centralized management in these networks. The packet drop attack is one of the attacks and it has a compromised node which drops the malicious packets. In WSNs, different techniques have been implemented to identify the packet drop attack but none of them provides the feasibility to stop or isolate their occurrence in the future. In recent times, the reputation systems provide the way to identify the trustworthy nodes for data forwarding. But the lack of data classification in the reputation systems affects the false positive rate. In this paper, a novel CONFIDENT SCORE based BAYESIAN FILTER NODE MONITORING AGENT (CFS-BFNMA) mechanism is introduced to identify & avoid the packet drop nodes and also to monitor the node behaviours to improve the false positive rate. The final CFS of a node is estimated based on the node past and threshold CFS values. The node monitoring agents (BFNMA) constantly monitors the forwarding behaviour of the nodes and assigns CFS based on the successful forwards. The NMA saves the copy of the data packets in their buffers before forwarding to the neighbour nodes to compare them. Also, this BFNMA analyses the traffic pattern of every round of transmission to improve the false positive rate. By comparing with other conventional security algorithms, the proposed mechanism has been improved the network security & false positive rate drastically based on the simulation results.


2021 ◽  
pp. 014556132110436
Author(s):  
Sanghoon Kim ◽  
Soo-Keun Kong ◽  
Jae Meen Lee ◽  
Se-Joon Oh

We report a case of cochleovestibular neurovascular compressive syndrome (CVCS)-induced drop attack treated with microvascular decompression (MVD) of the superior vestibular nerve. This report discusses the merits of surgical intervention through a review of related literature. A 58-year-old woman was referred to our clinic with a chief complaint of intermittent, strong, right-sided tinnitus lasting for a few seconds immediately prior to drop attack. Magnetic resonance imaging (MRI) showed bilateral neurovascular contact between the anterior inferior cerebellar artery (AICA) and the vestibulocochlear nerve. Based on MRI findings, history of present illness, and response to anticonvulsants, CVCS was suspected, and surgical decompression on the right side was subsequently performed. The patient became asymptomatic immediately after the surgery, and the vestibular-evoked myogenic potentials were normalized. No recurrence was reported during a 1-year follow-up period.


2021 ◽  
Vol 12 ◽  
pp. 217
Author(s):  
Takafumi Shimogawa ◽  
Nobutaka Mukae ◽  
Takato Morioka ◽  
Ayumi Sakata ◽  
Yasunari Sakai ◽  
...  

Background: Waardenburg syndrome (WS) is caused by autosomal dominant mutations. Since the coexistence of epilepsy and WS type I is rare, the detailed clinical features and treatment of epilepsy, including surgery, have not been fully reported for these patients. We report the first case of an individual with WS type I, who underwent corpus callosotomy (CC) for drug-resistant epilepsy and obtained good seizure outcomes. Case Description: A boy was diagnosed as having WS type I and developmental delay based on characteristic symptoms and a family history of hearing loss. He underwent cochlear implantation at 18 months of age. At 4 years of age, he developed epileptic seizures with a semiology of drop attack. Electroencephalography (EEG) showed bilateral synchronous high-amplitude spikes and wave bursts, dominant in the right hemisphere. Based on the multimodality examinations, we considered that ictal discharges propagated from the entire right hemisphere to the left, resulting in synchronous discharge and a clinical drop attack; therefore, CC was indicated. At 9 years of age, he underwent a front 2/3rd CC. At 1 year, the patient became seizure free, and interictal EEG showed less frequent and lower amplitude spike and wave bursts than before. Conclusion: When patients with WS Type I and cognitive impairment show drug-resistant epilepsy, clinicians should consider a presurgical evaluation.


Author(s):  
Sangeetha V ◽  
Dr. G. Umamaheswari

Performance and security are two critical functions of wireless ad-hoc networks (WANETs). Network security ensures the integrity, availability, and performance of WANETs. It helps to prevent critical service interruptions and increases economic productivity by keeping networks functioning properly. Since there is no centralized network management in WANETs, these networks are susceptible to packet drop attacks. In selective drop attack, the neighbouring nodes are not loyal in forwarding the messages to the next node. It is critical to identify the illegitimate node, which overloads the host node and isolating them from the network is also a complicated task. Resistive to selective drop attack (RSDA) scheme is proposed to provide effective security against selective drop attack. A lightweight RSDA protocol is proposed for detecting malicious nodes in the network under a particular drop attack. The RSDA protocol can be integrated with the many existing routing protocols for WANETs such as AODV and DSR. It accomplishes reliability in routing by disabling the link with the highest weight and authenticate the nodes using the elliptic curve digital signature algorithm. In the proposed methodology, the packet drop rate, throughput and end to end delay are analysed.


2021 ◽  
Author(s):  
Vinoth kumar P ◽  
Venkatesh K

Abstract Performance and protection are the main important factors of Wireless Ad-hoc Network. Network protection includes the protection, stability and parameters of WANET. This helps to avoid significant service disruptions and increases network productivity by making the network more efficient. Since wireless ad hoc networks lack concentrate network management, these methods are vulnerable to data attack. In selected intruder finding tests, the neighboring locations are not trusted to send messages below. It is important to expose the invalid node, which pulls the capture mode and separates it from the network by pushing its routing mechanism. In this paper, we introduce the Resistant Drop Attack (RDA) method to provide effective protection against data loss. An RDA network protocol is recommended to detect weak nodes in the network during a fixed-speed attack. The RDA protocol can be embedded with present Wireless Ad-hoc Network routing systems such as AODV and DSR. Using the Digital Signature Algorithm (DSA) improves the reliability of the route by blocking links at high speeds and verifying the nodes.


2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


2020 ◽  
Vol 140 ◽  
pp. 109668
Author(s):  
A. Pace ◽  
G. Iannella ◽  
V. Rossetti ◽  
A. Colizza ◽  
G. Magliulo

2020 ◽  
Vol 77 (7) ◽  
pp. 897
Author(s):  
Zichen Chen ◽  
Yuzhong Zhang ◽  
Qing Zhang

Sign in / Sign up

Export Citation Format

Share Document