Network Layer Attacks: Analysis & Solutions, A Survey

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2

Abstract

Abstract - An ever-existing concern is the lack of security due to the very fact that the technology is wireless and is vulnerable to security threats & attacks. Also, among the wide-spread characteristics of a CR, selforganized security management is one of prime considerations. Each layer in cognitive radios is susceptible to widespread threats and security attacks. The scope of this paper reveals a detailed tabulation of the possible security threats/attacks faced by cognitive radios & cognitive radio networks in the Network layer, along withthe current state-of-the-art to detect the corresponding attacks and discuss the possible countermeasures for the same. The paper makes an attempt to effectively survey the existing detection techniques as well as counter measures relevant to Network layer attacks

Authors and Affiliations

Shruthi N , C K Vinay

Keywords

Related Articles

 Analysis of Iris Recognition Based On FAR and FRR Using Hough Transform

Abstract: Iris recognition is an identification method of biometric that uses pattern-recognition techniques. It is one of the most biometrical techniques used for personal identification. In this paper, we give a brief...

 Customized Ontology model for Web Information Gathering using Clustering

 Abstract: The explosion of data leads to the problem on how information should be retrieved accurately and effectively. To address this issue, ontology’s are widely used to represent user profiles in personalized w...

 Study of Web Crawler and its Different Types

 Due to the current size of the Web and its dynamic nature, building an efficient search mechanism is very important. A vast number of web pages are continually being added every day, and information is constant...

Segmentation of Tumor Region from Brain Mri Images Using Fuzzy C-Means Clustering And Seeded Region Growing

Abstract: The detection of brain tumor is one of the most challenging tasks in the field of medical image processing, since brain images are very complicated and tumors can be analyzed efficiently only by the expert radi...

 Content Evocation Using Web Scraping and Semantic Illustration

  Abstract: Web scraping is the process of automatically collecting information from the World Wide Web. It is a field with active developments, sharing a common goal with the semantic web vision, an ambitious initi...

Download PDF file
  • EP ID EP128317
  • DOI -
  • Views 123
  • Downloads 0

How To Cite

Shruthi N, C K Vinay (2016). Network Layer Attacks: Analysis & Solutions, A Survey. IOSR Journals (IOSR Journal of Computer Engineering), 18(2), 67-80. https://europub.co.uk/articles/-A-128317