On Detecting Termination in Cognitive Radio Networks
CONFERENCE
1.
2. CONTENT
INTRODUCTION
OVER VIEW
PROTOCOLS AND ATTACKS
STATEFUL PROTOCOLS AND THEIR ATTACKS
STATELESS PROTOCOLS AND THEIR ATTACKS
CLEAN STATE SECURE ROUTING PROTOCOL (PLGP)
MODULES
CONCLUSION
3. INTRODUCTION
• Fundamental Issue
• Proposed Method Discusses Resource Depletion Attacks
• Minimal Exposure Paths
• An Algorithm Is Used
• Wireless Medium Allows An Attacker
4. OVER VIEW
• Communication In Terms Of Power
– The Carousel Attack (Allowing Single Packet)
– The Stretch Attack (Artificially Long Route)
Fig. 1 Fig. 2
7. Stateful Protocols and their
Attacks
• It Requires The Server
• Two Important Classes
– Olsr
– Dsdv
• Two Types Of Attacks
– Directional Antenna Attack
– Malicious Discovery Attack.
8. Stateless Protocols and their
Attacks
• It doesn’t requires the server
• Communication protocol
• Two types of attacks
– Carousel Attack
– Stretch attack
9. Clean State Secure Routing
Protocol (PLGP)
• Provable Security Against Vampire Attacks
– Definition 1
No- backtracking is satisfied
– Definition 2
The hop count of packet p received