نتایج جستجو برای: flood routing

تعداد نتایج: 76636  

Journal: :IOP Conference Series: Earth and Environmental Science 2019

Journal: :Journal of Korea Water Resources Association 2014

Journal: :Polish Journal of Environmental Studies 2022

2015
Parul Garg Sandeep Waraich

The UWSN has found their place in many applications like sea exploration, flood detection and many more. The sensor nodes used in UWSN are installed with specialized depth sensors to compute the depth value of itself with respect to sink that is deployed at the surface. Obviously, to transfer data by sensor nodes to sink, some routing protocol is necessary for communication. There are many rout...

Journal: :CoRR 2008
Jayesh Kataria Prabhakar S. Dhekne Sugata Sanyal

Reactive routing protocols like Ad-hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing in Ad-Hoc Wireless Networks (DSR) which are used in Mobile and Ad-hoc Networks (MANETs) work by flooding the network with control packets. There is generally a limit on the number of these packets that can be generated or forwarded. But a malicious node can disregard this limit and flood t...

2011
Marina Yusoff Junaidah Ariffin Azlinah Mohamed

An optimal evacuation route plan has to be established to overcome the problem of poor coordination and uneven distribution of vehicles before or during disaster. This article introduces the evacuation vehicle routing problem (EVRP) as a new variant to the vehicle routing problem (VRP). EVRP is a process of moving vehicles from a vehicle location to the potentially flooded area (PFA), and from ...

2004
Baruch Awerbuch Reza Curtmola David Holmer Cristina Nita-Rotaru Herbert Rubens

Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the network are referred to as Byzantine attacks. Traditional secure routing protocols are vulnerable to this class of attacks since they usually assume that once authenticated, a node can be trusted to execute the protocol correctly. We present a detailed description of several By...

2014
Mohamed A. Abdelshafy Peter J. B. King

AODV is a reactive MANET routing protocol that is vulnerable to a dramatic collapse of throughput when malicious intruders flood the network with bogus route requests. We introduce a simple mechanism to resist such attacks that can be incorporated into any reactive routing protocol. It does not require expensive cryptography or authentication mechanisms, but relies on locally applied timers and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید