نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

2012
Revathi Venkataraman M. Pushpalatha T. Rama Rao

The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by indulging in flooding attacks on their n...

Journal: :I. J. Network Security 2014
Wei Teng Li Tung-Huang Feng Min-Shiang Hwang

Wireless Sensor Networks (WSNs) are composed of a number of resource-constrained sensor nodes which are often deployed in unattended environments. Therefore, WSNs easily encounter a variety of physical attacks.In this paper, we focus on one of physical attacks known as node replication attack, where an intruder randomly captures a legitimate sensor node, and collects all secret element. Then an...

Journal: :CIT 2015
Arpita Chakraborty Srinjoy Ganguly Mrinal K. Naskar Anupam Karmakar

Congestion control and energy consumption in Wireless Multimedia Sensor Network is a new research subject which has been ushered in through the introduction of multimedia sensor nodes that are capable of transmitting large volume of high bit rate heterogeneous multimedia data. Most of the existing congestion control algorithms for Wireless Sensor Networks do not discuss the impact of security a...

2013
Anwar Hussain

A wireless ad-hoc network is a collection of autonomous nodes that communicate with each other by each node acting as router and maintaining connectivity in a decentralized manner. The network topology is dynamic because the connectivity among the nodes may vary with time due to node departure, new arrivals and the possibility of having mobilenodes. In this paper, weexplore the effect on per se...

Journal: :Wireless Personal Communications 2013
Eyuphan Bulut Boleslaw K. Szymanski

Routing in delay tolerant networks (DTNs) is challenging due to their unique characteristics of intermittent node connectivity. Different protocols (single-copy, multi-copy, erasure-coding-based etc.) utilizing store-carryand-forward paradigm have been proposed to achieve routing of messages in such environments by opportunistic message exchanges between nodes that are in the communication rang...

Journal: :Computer Networks 2011
Jeff Seibert Xin Sun Cristina Nita-Rotaru Sanjay G. Rao

While mesh-based approaches have emerged as the dominant architecture for P2P streaming, the performance of these approaches under malicious participants has received little attention. In this paper, we provide a taxonomy of the implicit commitments made by nodes when peering with others. We show that when these commitments are not enforced explicitly, they can be exploited by malicious nodes t...

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

2016
Gayathri Dhananjayan Janakiraman Subbiah

Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to...

2012
Bharti Chouksey Ravi Mohan

Distributed databases is having highly spreading applications and availability of technologies such as cloud computing is making it more and more important in networked environment. As the need is increasing day by day therefore it is also requiring a secured system of information transfer between distributed databases. Mobile agents are very good mechanism to perform such information transfers...

Journal: :CoRR 2012
Jaydip Sen

A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید