نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

2011
Elisha O. Ochola Mariki M. Eloff

Mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized access point such as a base station. MANET has potential applications in very unpredictable and dynamic environments. The nodes, which act as a host as well as a router, communicate to each other through multi hops d...

Journal: :IEEE Communications Letters 2022

The 6TiSCH standard provides minimum latency and reliability in mission-critical IoT applications. To optimize resource allocation during network formation, IETF released the minimal configuration (6TiSCH-MC) standard. 6TiSCH-MC considered IETF’s IPv6 Routing Protocol for Low power Lossy (RPL) as a routing protocol both upward downward routing. In RPL, new joining nodes or joined transmit DODAG...

2006
Zhi Ang Eu Winston Khoon Guan Seah

A mobile ad hoc network is set up with a group of mobile wireless nodes without the use of any dedicated routers or base stations. Each node acts as an end node as well as a router for other nodes. There are generally two types of ad hoc routing protocols, reactive and proactive routing protocols. The focus of this paper centers on reactive routing protocols which establish routes between commu...

2011
Himadri Nath Saha

: In mobile ad-hoc network (MANET), secure routing is a challenging issue due to its open nature, infrastructure less property and mobility of nodes. Many mobile ad-hoc network routing schemes have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in mobile ad-hoc networks, an approach significantly different from the existing ones...

2016
Loay Abusalah Ashfaq Khokhar Mohsen Guizani Wenchao Huang Yan Xiong Chu-Hsing Lin Wei-Shen Lai Yen-Lin Huang Mei-Chun Chou Breno de Medeiros

An ad hoc network comprises of few particular connections which collectively collaborate to assist other connections to converse with its associates with the assistance of direct wireless broadcasting. Routing issue in ad hoc broadcasting revised routing problem in a unfavorable situations taking into assumption a secure surrounding. A Node Centric Trust based Secure Dynamic Source Routing (NCT...

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

2014
Fengjuan Liu

This paper introduces the wireless sensor network routing protocol and its security, and introduces the main several kinds of routing protocols, including the data centric routing protocol, hierarchical routing protocols and location-based routing protocol, finally according to the analysis of routing protocol common attack method. Ant colony algorithm is a distributed parallel algorithm. A sin...

2011
Arti Sharma Satendra Jain

Wireless mobile ad-hoc networks are those networks which has no physical links between the nodes. Due to the mobility of nodes, interference, multipath propagation and path loss there is no fixed topology in this network. Hence some routing protocol is needed to function properly for these networks. Many Routing protocols have been proposed and developed for accomplishing this task. The intent ...

2009
Emmanouil A. Panaousis Levon Nazaryan Christos Politis

The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all rescue teams. We use the term emergency MANETs (eMANETs) in order to describe Next Generation Networks (NGNs) which are deployed in emergency cases such as forest fires and terrorist attacks. Secure routing in MANETs is critical. Due to the absence of a central authori...

2007
Nathan S. Evans Chris GauthierDickey Christian Grothoff

In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks have a small-world topology; while short paths exist between any pair of nodes in small-world networks, it is non-trivial to determine such paths with a distributed algorithm. Recently, Clarke and Sandberg proposed the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید