Detection of Blackhole Behaviour Using Triangular Encryption in NS2

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator

A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving arbitrary in the place that have no network infrastructure. Basically Wireless or mobile networks are evolved to replace the wired networks from traditional scenario to new paradigm. The mobile ad hoc networks are purely infrastructure less network. Due to this vulnerabilities of the network are unprotected ...

متن کامل

Blackhole Detection in Manets Using Artificial Neural Networks

Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. A MANET is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predetermined organization of available links. Some characteristics of MANETs such as communication via wireless links, resource constraints (such as bandwidth and battery power), cooperation bet...

متن کامل

metrics for the detection of changed buildings in 3d old vector maps using als data (case study: isfahan city)

هدف از این تحقیق، ارزیابی و بهبود متریک های موجود جهت تایید صحت نقشه های قدیمی سه بعدی برداری با استفاده از ابر نقطه حاصل از لیزر اسکن جدید شهر اصفهان می باشد . بنابراین ابر نقطه حاصل از لیزر اسکنر با چگالی حدودا سه نقطه در هر متر مربع جهت شناسایی عوارض تغییر کرده در نقشه های قدیمی سه بعدی استفاده شده است. تمرکز ما در این تحقیق بر روی ساختمان به عنوان یکی از اصلی ترین عارضه های شهری می باشد. من...

Preventing Manets from Blackhole Attack using Blackhole Node Detection Monitoring System

Mobile Adhoc networks are prone to number of security threats due to unavailability of centralized authority. It incorporates various malicious activities within the network. This research focuses on single Blackhole attack but our design principles may be applicable to wide range of attacks. So, this proposed approach of Blackhole comprises of active routing misbehavior and forwarding misbehav...

متن کامل

Blackhole Detection and Prevention Strategies in DTN

Delay Tolerance Network (DTN) is a network which is used for sparse networks where network connectivity is not possible between two nodes so for this number of intermediate nodes is used to transfer messages. These intermediate nodes may cause network so security in DTN is a very difficult task. In this paper blackhole attack and its various detection techniques are presented with literature re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Technology

سال: 2013

ISSN: 2212-0173

DOI: 10.1016/j.protcy.2013.12.391