A distributed adaptive routing against selective forwarding attack in scale-free network considering cascading failure

R Yin, X Ma, H Yuan, M Zhai… - Journal of Complex …, 2023 - academic.oup.com
To address the issues of data insecurity and unreliable transmission, redundancy-based
data recovery can guarantee data security, but the increase of redundant data will reduce …

A security routing algorithm against selective forwarding attacks in scale-free networks

R Yin, F Zhang, Y Xu, L Liu, X Li - Procedia Computer Science, 2020 - Elsevier
Scale-free networks are vulnerable to the selective forwarding attacks where the legitimated
data packet is discarded by malicious nodes. And it is easy for non-balanced energy …

Model and analyze the cascading failure of scale-Free network considering the selective forwarding attack

R Yin, H Yuan, H Zhu, X Song - IEEE Access, 2021 - ieeexplore.ieee.org
Many real-world networks have scale-free characteristics and can be abstracted into scale-
free networks. Aiming at the problem that scale-free networks have low fault tolerance in the …

An selective forwarding attack considered routing protocol for scale-free network

R Yin, N Zhao, Y Xu - 2020 12th International Symposium on …, 2020 - ieeexplore.ieee.org
Considering malicious packet loss caused by selective forwarding attack in scale-free
network, a multipath routing protocol is proposed. First, to address malicious packet loss …

Dynamic attack-resilient routing in software defined networks

PM Mohan, M Gurusamy, TJ Lim - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The scale of connected devices in the modern communication network and its
heterogeneous nature have made securing the network more challenging. However, with …

A failure recovery method for routing system based on structured backup subgraph

Y Wang, ZX Wang, LC Zhang - 电子与信息学报, 2013 - jeit.ac.cn
Current failure recovery for routing system has not effectively resolved issues including
storage cost, redundant recovery and AS (Autonomous System) benefit protection. In the …

[PDF][PDF] Routing Protocol against Flooding Attack Using Median Value and Fixed Threshold

HTT Truong, HD Le, HT Nguyen, NT Luong - Journal of Communications, 2024 - jocm.us
Vector (AODV) protocol is that the Route Request Packet (RREQ) is not designed for
security purposes. Therefore, a malicious node can attack the network by continuously …

Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks

H Zhu, Z Zhang, J Du, S Luo… - International Journal of …, 2018 - journals.sagepub.com
Wireless sensor networks face threats of selective forwarding attacks which are simple to
implement but difficult to detect. It is difficult to distinguish between malicious packet …

[PDF][PDF] The importance of being adaptive for forwarding

C Sengul, AC Viana, R Friedman… - Extreme Workshop …, 2009 - pages.saclay.inria.fr
With the advances in wireless communication, spontaneously creating impromptu networks,
self-organizing and adapting to changing conditions are becoming a reality. Due to the …

[PDF][PDF] Efficient routing protection algorithm in large-scale networks

H Geng, H Zhang, Y Zhang - Computers, Materials & Continua, 2021 - cdn.techscience.cn
With an increasing urgent demand for fast recovery routing mechanisms in large-scale
networks, minimizing network disruption caused by network failure has become critical …