نتایج جستجو برای: black hole attack

تعداد نتایج: 253930  

Journal: :Indian Journal of Science and Technology 2016

Journal: :International Journal of Advanced Computer Science and Applications 2016

2003
Sanjay Ramaswamy Huirong Fu Manohar Sreekantaradhya John Dixon Kendall E. Nygard

Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. This generic characteristic of MANET has rendered it vulnerable to security attacks. In this paper, we address the problem of coordinated attack by multiple black holes acting in group. We present a technique ...

2016
Ira Nath

MANETs are accessible to various attacks [1]. Black hole attack is one kind of routing disturbing attacks [13] and can destroy a MANET partially or totally. In this paper Fuzzy Logic techniques have been used to detect black hole attacks and find out secure routing in wireless ad hoc networks. The proposed heuristic successfully detects the black hole in the network and this information is pass...

2016
Haiyan Liu Kongjun Bao

In this paper, some typical wireless attacks are considered, such as masquerade attack, black hole attack and replay attacks. To against the attacks which threat seriously security of Ad Hoc network, a new authentication scheme is proposed. The proposed scheme involves three main stages. Some advantages and drawbacks are discussed compared with other solutions presented in previous researches.

Journal: :International Journal of Advanced Computer Science and Applications 2014

Journal: :Electronics 2023

Mobile ad hoc networks (MANETs) are now key in today’s new world. They critically needed many situations when it is crucial to form a network on the fly while not having luxury of time or resources configure devices, build infrastructure, even have human interventions. Ad applications. For instance, they can be used battlefields, education, rescue missions, and other Such characterized by high ...

2012
Kamini Maheshwar Divakar Singh

In Mobile Wireless Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. It must discover its local neighbors and through them it will communicate to nodes that are out of its transmission range. Various features like open medium, dynamic topology, lack of clear lines of defense, makes MANET vulnerable to security attacks. Ad hoc on...

2005
Bo Sun Yong Guan Jian Chen

Mobile Ad-hoc NETworks (MANETS) have seen tremendous gmwth in recent years. It is a new paradigm of communication’ in which t h m is no fixed infrasmrcture. Nodes within the radio range of each other can communicate directly over the wireless link, while those that are far apart use other nodes as relays. Routing protocols are the cornerstone of MANET. In the past few years, much research effol...

2010
Ejiro .E. Igbesoko Mona Ghassemian

Security in Mobile Ad Hoc Networks (MANETs) has received lots of research attention in recent years. With the proliferation of mobile devices and the inherent characteristics of MANETs as self-organized and self-configuring networks, a great need to address security concerns in these networks have arisen. Security in these networks could be looked at from various view points with respect to dif...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید