×
Sep 28, 2012 · CTAC provides a technique that isolates the malicious nodes from the network thereby removing their ability to cause future damage. The ...
In this paper, we present a scalable countermeasure for the control traffic tunneling attack, called CTAC, which alleviates these drawbacks and efficiently ...
Fig. 10. Global isolation time with NCH. - "CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks"
Dive into the research topics of 'CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks'. Together they form a unique fingerprint ...
In this attack an attacker capture the packets at one node in the network and send it to the another attacker node at a distant location through tunnels which ...
Sep 28, 2012 · In this paper, we present a scalable countermeasure for the control traffic tunneling attack, called CTAC, which alleviates these drawbacks and efficiently ...
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks. I Khalil, M Awad, A Khreishah. Computer Networks 56 (14), 3300-3317, 2012.
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks ... wireless ad hoc and sensor networks open the door for great networking ...
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks. Computer Networks. 2012 | Journal article. DOI: 10.1016/j.comnet.2012.06 ...
Khreishah, “CTAC: Control traffic tunneling attacks countermeasures in mobile wireless networks”, Computer Networks: The International Journal of Computer ...