نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

2011
Dayananda Sagar

Sensor nodes are of low-cost and hence are vulnerable to attacks. The adversaries need not endure hardship to control these nodes. Though the authentication process takes place, followed by encryption process, the nodes are liable to many kinds of attacks. Malicious nodes or compromised nodes are difficult to detect. These malicious nodes drain the energy available, give false readings, project...

2014

In this chapter, two new attacks are introduced in MANETs. The CIA in Mobile Ad hoc networks (MANETs) has been successfully eliminated in Wireless Sensor networks, but in MANETs the legitimate node is also reported as a malicious node (Farah Kandah et al 2011). In CIA, an adversary utilizes a colluding attack in MANETs by injecting malicious nodes in the network and hiding their identities from...

Journal: :Computers & Electrical Engineering 2015
Madasamy Kaliappan Balasubramanian Paramasivan

Collaboration between mobile nodes is significant in Mobile Ad Hoc Networks (MANETs). The great challenges of MANETs are their vulnerabilities to various security attacks. Because of the lack of centralized administration, secure routing is challenging in MANETs. Effective secure routing is quite essential to protect nodes from anonymous behaviours. Game theory is currently employed as a tool t...

2005
Asad Amir Pirzada Chris McDonald

Mobile ad-hoc wireless networks generally comprise nodes having meagre computation and communication resources. To perform multi-hop communication in a dynamic topology, these nodes execute special routing protocols. Each node performs the function of a a mobile router and directs packets to other nodes in the network. For accurate functioning of the network it is imperative that all nodes exec...

2010
Emmanuelle Anceaume Yann Busnel Sébastien Gambs

We consider the problem of uniform sampling in large scale open systems. Uniform sampling is a fundamental primitive that guarantees that any individual in a population has the same probability to be selected as sample. An important issue that seriously hampers the feasibility of uniform sampling in open and large scale systems is the unavoidable presence of malicious nodes. In this paper we sh...

2011
Ing-Ray Chen Hamid Al-Hamadi

Multisource multipath data routing to a remote sink node is an effective way to cope with unreliable and/or malicious nodes in wireless sensor networks (WSNs). In this paper we analyze the optimal amount of redundancy in terms of the number of source sensors sensing the same physical phenomena and the number of paths through which data are routed to a remote sink node in the presence of unrelia...

2014
Ameeta Seehra

A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes, which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the detection and prevention of black-hole attack in MANETs. In this approach every member of t...

2017
Karim KONATE

In this work we have devoted to some proposed analytical methods to simulate these attacks, and node mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious n...

2003
Luiz Olavo S. Rocha Luís Henrique Maciel Kosmalski Costa Otto Carlos Muniz Bandeira Duarte

Routing is the key issue for ad hoc networks due to the wireless medium, absence of infra-structure and distributed operation. In ad hoc networks, every node acts as a router. Hence, securing the routing mechanism is a critical issue. This paper analyzes attacks that exploit the vulnerabilities of the ad hoc routing mechanisms. The attacks are based on the malicious behavior of some network nod...

2016
Jeevaa Katiravan D. Srinivasa Rao S. Murthy C. Siva Ram L. Abusalah A. Khokhar Vinod Namboodiri Manish Agarwal Lixin Gao

In wireless ad hoc networks, traditional routing considers hop count and distance for making the route selection. The network is prone to various types of attacks by intruders in which packets maybe modified or dropped. A trust based mechanism maybe employed in which the nodes are constantly monitored for malicious behaviour. An abnormality in the behaviour of the intermediate node effects the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید