Network Layer Attacks: Analysis & Solutions, A Survey

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2

Abstract

Abstract - An ever-existing concern is the lack of security due to the very fact that the technology is wireless and is vulnerable to security threats & attacks. Also, among the wide-spread characteristics of a CR, selforganized security management is one of prime considerations. Each layer in cognitive radios is susceptible to widespread threats and security attacks. The scope of this paper reveals a detailed tabulation of the possible security threats/attacks faced by cognitive radios & cognitive radio networks in the Network layer, along withthe current state-of-the-art to detect the corresponding attacks and discuss the possible countermeasures for the same. The paper makes an attempt to effectively survey the existing detection techniques as well as counter measures relevant to Network layer attacks

Authors and Affiliations

Shruthi N , C K Vinay

Keywords

Related Articles

 Network Intrusion Detection in Virtual Network Systems and Countermeasure Selection (NIDCS)

 Abstract: Cloud computing provides shared resources to various cloud users. All the users share various computing resources e.g., being connected through the same switch, sharing the same data storage and the file...

 Twitter Sentiment Classification on Sanders Data using HybridApproach

Abstract : Sentiment analysis is very perplexing and massive issue in the field of social data mining. Twitter isone of the mostly used social media where people discuss on various issues in a dense way. The tweets about...

Enhancing Micro-ATMs and POS Terminals Authentication System Using AdvancedBiometric Techniques

Most of the transactions at the Point of Sale (POS) terminals are carried out by payments through Credit or Debit cards.Many leading banks have started the door step banking service with the help of microATM device.The c...

 Stegnography in video files using Multivariate Regression and Flexible Macroblock Ordering

Abstract: Data hiding is the ability of embedding data into a digital cover with a minimum amount of perceivable degradation, i.e., the embedded data is invisible or inaudible to a human observer. Data hiding consists of...

 Web Based Solution for Thermal Printing of Bar Code

A barcode is an optical machine-readable representation of data, which shows the relevant data about the material to which it is attached or fixed. With the help of bar code, the information can be assessed automatical...

Download PDF file
  • EP ID EP128317
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Shruthi N, C K Vinay (2016). Network Layer Attacks: Analysis & Solutions, A Survey. IOSR Journals (IOSR Journal of Computer Engineering), 18(2), 67-80. https://europub.co.uk./articles/-A-128317