Internet of Things: Novel Advances and Envisioned Applications by D. P. Acharjya & M. Kalaiselvi Geetha
Author:D. P. Acharjya & M. Kalaiselvi Geetha
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
2.4 Routing Anomalies
Routing anomalies are more delicate forms of faults. In such cases, a faulty node cooperate in the information gathering process, but it does not do so according to the protocol requirement by design. The impact of which is generally local and restraints to individual nodes. A routing anomaly often heads to coordinate faulty behaviors among multiple nodes. A node may only advance a subset of traffic and mistreat some. Routing anomaly is produced due to a number of reasons such as buggy routing module, injection of false routing message, and malicious routing attack from foreign entities.
The prime complexity is how to accomplish software faults methodologically. One solution is to utilize fault reports from current sensor network projects whereas the other is to correct programs at random places. Unfortunately, the first solution is not useful as these faults are not well recorded. But, faults created this way may not be very significant. In contrast, considerable work has been performed on routing attacks and their defenses in reference [7]. Various well recorded routing attacks to produce significant routing faults are black hole, sink hole, flooding, warm hole, grey hole etc. This section talk about such attacks briefly along with its symptoms.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(26274)
Hello! Python by Anthony Briggs(25203)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(24432)
Kotlin in Action by Dmitry Jemerov(23522)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(22868)
Dependency Injection in .NET by Mark Seemann(22655)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(21419)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(20255)
Grails in Action by Glen Smith Peter Ledbrook(19329)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17044)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(16356)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(14070)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(12244)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11519)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10635)
Hit Refresh by Satya Nadella(9209)
The Kubernetes Operator Framework Book by Michael Dame(8573)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8423)
Robo-Advisor with Python by Aki Ranin(8365)