نتایج جستجو برای: malicious nodes
تعداد نتایج: 141332 فیلتر نتایج به سال:
he vehicular adhoc network is the decentralized type of network. The vehicle nodes can join or leave the network when they want. In the such type of network security, routing and quality of service are the three major issues of the network. In the network malicious node is present which is responsible to trigger various types of active and passive attacks. The Sybil attack is the active types o...
In this paper, we focus on attacks and defense mechanisms in additive reputation systems. We start by surveying the most important protocols that aim to provide privacy between individual voters. Then, we categorize attacks against additive reputation systems considering both malicious querying nodes and malicious reporting nodes that collaborate in order to undermine the vote privacy of the re...
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node and enhance data security is an important issue on Ad hoc networks. In this study, we provide a path hopping method based on reverse AODV (R-AODV). By reverse AODV, source node builds multipath to destination and adapt...
This paper present the design and function of magiran.com, a databse of periodicals published in Iran. It also attempts to answer the following questions: How many of the total periodicals published in Iran are covered by magiran? What is the subject coverage of the periodicals covered? Which subjects seem to have been given importance among the periodicals covered? How many of the periodicals ...
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is challenging. We propose a robust cooperative trust establishment scheme to improve the reliability of packet delivery in MANETs, particularly in the pres...
Node misbehavior problems have received increased attention in multicasting in Mobile ad hoc networks (MANET). The misbehaving nodes can be either selfish or malicious nodes. The main goal of the malicious nodes is to intentionally interrupt the network using various attacks. Hence it is essential to develop a mitigation technique against misbehaving attacks. In this paper, we propose a misbeha...
Mobile Ad hoc Network is comprised of several mobile nodes without any centralized infrastructure. MANETs are lack of boundaries due to wireless communication medium. Due to the absence of centralized infrastructure, changing topology and distributed nature, MANETs is prone to several security threats and intruders. Thus, it is necessary to safeguard the network from malicious nodes. Thus to ov...
In mobile ad hoc network (MANET), the process of intrusion detection is difficult due to the features of the MANET such as dynamic topology, limited transmission range, mobility, etc. The movement of nodes plays the major role. In this paper, three (Swarm based Intrusion detection)SBDTs are created namely SBDTLOW-MOBILITY, SBDT-MEDIUM-mobility and SBDTHIGH-MOBILITY. In all the three SBDTs, the ...
Wireless sensor network (WSN) is vulnerable to a wide range of attacks due to its natural environment and inherent unreliable transmission. To protect its security, intrusion detection systems (IDSs) have been widely deployed in such a wireless environment. In addition, trust-based mechanism is a promising method in detecting insider attacks (e.g., malicious nodes) in a WSN. In this paper, we t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید