نتایج جستجو برای: malicious nodes
تعداد نتایج: 141332 فیلتر نتایج به سال:
The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by indulging in flooding attacks on their n...
Wireless Sensor Networks (WSNs) are composed of a number of resource-constrained sensor nodes which are often deployed in unattended environments. Therefore, WSNs easily encounter a variety of physical attacks.In this paper, we focus on one of physical attacks known as node replication attack, where an intruder randomly captures a legitimate sensor node, and collects all secret element. Then an...
Congestion control and energy consumption in Wireless Multimedia Sensor Network is a new research subject which has been ushered in through the introduction of multimedia sensor nodes that are capable of transmitting large volume of high bit rate heterogeneous multimedia data. Most of the existing congestion control algorithms for Wireless Sensor Networks do not discuss the impact of security a...
A wireless ad-hoc network is a collection of autonomous nodes that communicate with each other by each node acting as router and maintaining connectivity in a decentralized manner. The network topology is dynamic because the connectivity among the nodes may vary with time due to node departure, new arrivals and the possibility of having mobilenodes. In this paper, weexplore the effect on per se...
Routing in delay tolerant networks (DTNs) is challenging due to their unique characteristics of intermittent node connectivity. Different protocols (single-copy, multi-copy, erasure-coding-based etc.) utilizing store-carryand-forward paradigm have been proposed to achieve routing of messages in such environments by opportunistic message exchanges between nodes that are in the communication rang...
While mesh-based approaches have emerged as the dominant architecture for P2P streaming, the performance of these approaches under malicious participants has received little attention. In this paper, we provide a taxonomy of the implicit commitments made by nodes when peering with others. We show that when these commitments are not enforced explicitly, they can be exploited by malicious nodes t...
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to...
Distributed databases is having highly spreading applications and availability of technologies such as cloud computing is making it more and more important in networked environment. As the need is increasing day by day therefore it is also requiring a secured system of information transfer between distributed databases. Mobile agents are very good mechanism to perform such information transfers...
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید