A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

A Modified Approach to Improve Security and Congestion Control in AODV Routing Protocol against Blackhole Attack

A Wireless ad-hoc network is an impermanent network set up by wireless mobile nodes moving random in those spots which have no network framework (infrastructure) or incorporated (centralized) access point. Since the independent nodes have ability to interconnect with each other, they collaborate with one another by sending information packets to different nodes in the system. Thusly the nodes d...

متن کامل

A Survey on Security Solutions of AODV Routing Protocol against Black Hole Attack in MANET

Ad Hoc On-Demand Distance Vector (AODV) routing protocol is among the efficient routing protocols in Mobile Ad Hoc Network (MANET). Because of its routing features AODV has gained popularity compared to other routing protocols, but this protocol lacks a security features which make it more vulnerable to malicious attack particularly black hole attack. A single or cooperate black hole attacks wh...

متن کامل

A Cluster Based Hierarchical Routing Protocol for Mobile Networks

We propose a hierarchical, cluster based semi-distributed routing protocol for a mobile ad hoc network. The network graph is partitioned into clusters using heuristics and the shortest routes are first calculated locally in each cluster in the first phase. The network is then simplified to consist only of the nodes that have connections to other clusters called the neighbor nodes and the shorte...

متن کامل

OSRWQOS: Optimized Secure Routing Protocol with QoS against Byzantine Attack

Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc Networks (MANETs) in military, government and commercial applications. Secure ad hoc networks are expected to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. Routing Algorithm that integrates security and performance requirements ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Wireless and Microwave Technologies

سال: 2011

ISSN: 2076-1449,2076-9539

DOI: 10.5815/ijwmt.2011.02.10