نتایج جستجو برای: black hole attack

تعداد نتایج: 253930  

Journal: :International Journal of Computer Network and Information Security 2012

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2019

2014
Priyanka Bansal Anuj K. Gupta

In Mobile Ad-Hoc Networks (MANETs), security is one of the most important concerns because a MANET's system is much more vulnerable to attacks than a wired or infrastructure-based wireless network. Designing an effective security protocol for MANET is a very challenging task. This is mainly due to the unique characteristics of MANETs, namely shared broadcast radio channel, insecure operating en...

2012
ARUNMOZHI ANNAMALAI VENKATARAMANI YEGNANARAYANAN

The risks to users of wireless technology have increased as the service has become more popular. Due to the dynamically changing topology, open environment and lack of centralized security infrastructure, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and to ad hoc routing attacks. There are a wide variety of routing attacks that target the weakness of MANETs. ...

2012
Dr. K. Chitra

–Mobile network has a highest level of vulnerability since mobile networks are liable to attack due to its transparent location. The Adhoc nature posses structure less property due to its dynamic nature which paves way for multiple ways of attacks. Implementing IDS is a tedious process and one among them is Worm Hole attack which really challenges researchers to provide solution for preventing ...

2013
Hitesh Patel

A Mobile ad-hoc network is a temporary network set up by mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the ro...

2016
A. R. Rajeswari K. Kulothungan A. Kannan

In multi-hop wireless ad hoc network, the packets are transmitted through intermediate nodes to reach the destination. In this topological structure, there is no centralized co-ordinating, monitoring or control point. Due to this type of network environment, an intermediate node can act as either selfish or malicious to drop packets. The primary objective of such an untrustworthy behavior of th...

2012
Govind Sharma Manish Gupta

Mobile Ad-hoc network (MANET) has become an individual part for communication for mobile device. Therefore, interest in research of Mobile Ad-hoc network has been growing since last few years. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared ...

2007
Chang-Wu Yu Tung-Kuang Wu Rei-Heng Cheng Shun Chao Chang

A mobile node in ad hoc networks may move arbitrarily and acts as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. The black hole problem, in which some malicious nodes pretend to be intermediate nodes of a route to some given destinations and drop any packet that subsequently goes through it, is one of the major types of attack. In...

2012
Purushottam Patel Rupali Soni

Routing is a easiest way to launch a attack in MANET due to highly dynamic topology which makes routing procedure more complicated and insecure and therefore nodes are more susceptible to compromise and are particularly vulnerable to denial of service attack (DoS) attacks launched by malicious nodes or intruders .Another challenging issue is selfishness of a node which dramatically decreases th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید