Detection of Blackhole Behaviour Using Triangular Encryption in NS2
نویسندگان
چکیده
منابع مشابه
Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator
A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving arbitrary in the place that have no network infrastructure. Basically Wireless or mobile networks are evolved to replace the wired networks from traditional scenario to new paradigm. The mobile ad hoc networks are purely infrastructure less network. Due to this vulnerabilities of the network are unprotected ...
متن کاملBlackhole Detection in Manets Using Artificial Neural Networks
Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. A MANET is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predetermined organization of available links. Some characteristics of MANETs such as communication via wireless links, resource constraints (such as bandwidth and battery power), cooperation bet...
متن کاملmetrics for the detection of changed buildings in 3d old vector maps using als data (case study: isfahan city)
هدف از این تحقیق، ارزیابی و بهبود متریک های موجود جهت تایید صحت نقشه های قدیمی سه بعدی برداری با استفاده از ابر نقطه حاصل از لیزر اسکن جدید شهر اصفهان می باشد . بنابراین ابر نقطه حاصل از لیزر اسکنر با چگالی حدودا سه نقطه در هر متر مربع جهت شناسایی عوارض تغییر کرده در نقشه های قدیمی سه بعدی استفاده شده است. تمرکز ما در این تحقیق بر روی ساختمان به عنوان یکی از اصلی ترین عارضه های شهری می باشد. من...
Preventing Manets from Blackhole Attack using Blackhole Node Detection Monitoring System
Mobile Adhoc networks are prone to number of security threats due to unavailability of centralized authority. It incorporates various malicious activities within the network. This research focuses on single Blackhole attack but our design principles may be applicable to wide range of attacks. So, this proposed approach of Blackhole comprises of active routing misbehavior and forwarding misbehav...
متن کاملBlackhole Detection and Prevention Strategies in DTN
Delay Tolerance Network (DTN) is a network which is used for sparse networks where network connectivity is not possible between two nodes so for this number of intermediate nodes is used to transfer messages. These intermediate nodes may cause network so security in DTN is a very difficult task. In this paper blackhole attack and its various detection techniques are presented with literature re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Technology
سال: 2013
ISSN: 2212-0173
DOI: 10.1016/j.protcy.2013.12.391