نتایج جستجو برای: black hole attack
تعداد نتایج: 253930 فیلتر نتایج به سال:
In this era of technology all the technical domains are continuously grown and develop. The evidence of this growth is different kinds of communication devices is common for all persons. As the domain of communication is grown need to provide high performance end to end reliable delivery is increases. At the same time security measures is a one of the most issue in communication system. In this...
Absence of infrastructure and dynamic nature of MANET invites intruder to launch attack, one of them is flooding. On demand routing such as AODV is more popular then proactive routing use flooding to discover route. Attackers used this concept to launch DoS attack like flooding; black hole and gray hole are the known attack in MANET. In this paper we have proposed a new method based on AODV beh...
In mobile ad-hoc network (MANET), secure routing is a challenging issue due to its open nature, infrastructure less property and mobility of nodes. The lack of static infrastructure causes several issues in mobile ad hoc network (MANET) environment, such as node authentication and secure routing. In this paper we propose a new protocol for secure routing of data packets in MANET. The approach i...
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is challenging. The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself t...
With the emergence of mobile ad-hoc networks, more users desire connectivity regardless of geographic location. MANETs are a promising technology in terms of the applications in the military, emergency situations, and general daily life activities. Various protocols have been developed to handle the routing information in such networks. However, most protocols are vulnerable to various threats....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید