Network wormhole attacks without a traditional wormhole.
Nadav SchweitzerAmit DvirAriel StulmanPublished in: Ad Hoc Networks (2023)
Keyphrases
- traffic analysis
- mobile wireless
- wireless networks
- network attacks
- network structure
- network intrusion
- network model
- security risks
- security threats
- security measures
- mobile ad hoc networks
- buffer overflow
- cyber attacks
- intrusion detection and prevention
- neural network
- attack detection
- black hole attack
- fault injection
- intrusion prevention
- intermediate nodes
- network intrusion detection
- countermeasures
- watermarking scheme
- ad hoc networks
- computer networks
- anomaly detection
- peer to peer
- wireless sensor networks