نتایج جستجو برای: black hole attack

تعداد نتایج: 253930  

2012
Chandni Garg Preeti Sharma Prashant Rewagad

In this era of technology all the technical domains are continuously grown and develop. The evidence of this growth is different kinds of communication devices is common for all persons. As the domain of communication is grown need to provide high performance end to end reliable delivery is increases. At the same time security measures is a one of the most issue in communication system. In this...

2012
Meenakshi Patel Sanjay Sharma

Absence of infrastructure and dynamic nature of MANET invites intruder to launch attack, one of them is flooding. On demand routing such as AODV is more popular then proactive routing use flooding to discover route. Attackers used this concept to launch DoS attack like flooding; black hole and gray hole are the known attack in MANET. In this paper we have proposed a new method based on AODV beh...

2012
Mayank Bansal

In mobile ad-hoc network (MANET), secure routing is a challenging issue due to its open nature, infrastructure less property and mobility of nodes. The lack of static infrastructure causes several issues in mobile ad hoc network (MANET) environment, such as node authentication and secure routing. In this paper we propose a new protocol for secure routing of data packets in MANET. The approach i...

2014
Hicham Zougagh Ahmed Toumanari Rachid Latif

In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is challenging. The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself t...

Journal: :IJTD 2012
Raees Khan ShahSani Muhammad Bakhsh Amjad Mahmood

With the emergence of mobile ad-hoc networks, more users desire connectivity regardless of geographic location. MANETs are a promising technology in terms of the applications in the military, emergency situations, and general daily life activities. Various protocols have been developed to handle the routing information in such networks. However, most protocols are vulnerable to various threats....

Journal: :International Journal of Computer Applications 2016

Journal: :International Journal of Computer Applications 2018

Journal: :International Journal of Modern Education and Computer Science 2012

Journal: :International Journal of Information Technology, Modeling and Computing 2014

Journal: :International Journal of Computer Applications 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید