نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

2015
Tariq Siddiqui Tanveer Farooqui

In Associate in Nursing Ad-hoc network may be a assortment of mobile nodes dynamically forming a short lived network while not the employment of any existing network infrastructure or centralized administer. attributable to restricted communication vary among mobile nodes in ad-hoc network, many network hopes is also required to deliver a packet from one node to a different node within the wire...

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018

Journal: :International Journal for Research in Applied Science and Engineering Technology 2018

Journal: :MONET 2005
Tirthankar Ghosh Niki Pissinou S. Kami Makki

Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity. This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper we have designed...

Journal: :Computer Networks 2007
Issa M. Khalil Saurabh Bagchi Ness B. Shroff

In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node far away, which replays it locally. This...

2014
Jaydip Sen

A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, a...

2004
Punit Rathod Nirali Mody Dhaval Gada Rajat Gogri Zalak Dedhia Sugata Sanyal Ajith Abraham

In Ad hoc On Demand Vector (AODV) routing protocol for Mobile Ad hoc Networks (MANET), malicious nodes can easily disrupt the communication. A malicious node that is not part of any route may launch Denial of Service (DoS) Attack. Also once a route is formed, any node in the route may turn malicious and may refrain from forwarding packets, modify them before forwarding or may even forward to an...

Journal: :Applied Mathematics and Computation 2014
A. K. Misra Maitri Verma Anupama Sharma

Keywords: Mathematical model Computer networks Malware Anti-malware Stability a b s t r a c t In an era with affluence of local area networks, the recurrent attacks of viruses and other malicious objects are undoubtedly an intruding threat. These malicious objects spread quickly through an unprotected network, corrupt the data and harm the nodes. To comprehend this problem and its plausible sol...

Journal: :Comput. J. 2011
Partha Mukherjee Sandip Sen

Remotely deployed sensor networks are vulnerable to both physical and electronic security breaches. The sensor nodes, once compromised, can send erroneous data to the base station, thereby possibly compromising network effectiveness. We assume that sensor nodes are organized in a hierarchy and use offline neural network based learning technique to predict the data sensed at any node given the d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید