نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

2017
Sandeep Kaur Usvir Kaur

The cloud computing is the architecture in which hosts, virtual machines and users are involved in the communication. The cloud is the decentralized nature due to which malicious nodes enter the network and trigger various types of attacks. The impersonate attack is the denial of service attack and it reduced the efficiency of the cloud architecture. In this work, zombie attack will be isolated...

2007
Christian Sommer Shinichi Honiden

Mobile agents can be used to efficiently aggregate information in sensor networks. The originator aims at obtaining the correct result, even in the presence of byzantine nodes or a malicious aggregator agent. Secure information aggregation considers these situations. We propose to use a mobile agent for the hierarchical in-network aggregation scheme of Chan et al. and we introduce a greedy stra...

2014
Nishant Kumar Jha

Peer-to-peer streaming has witnessed a great success, thanks to the possibility of aggregating resources from all participants. However, performance of the entire system may be highly degraded due to the presence of malicious peers that share bogus data on purpose. In a peer-to-peer (P2P) streaming system, since each peer needs to participate in uploading data to other peers, malicious peers ma...

2003
Po-Wah Yau Chris J. Mitchell

The Dynamic Source Routing protocol for ad hoc networks is one of the leading candidates for adoption by the IETF amongst the class of reactive routing protocols. The currently defined protocol assumes total node cooperation, which allows attacks by failed or malicious nodes whose behaviour violates the protocol rules. Failed nodes will typically fail to forward information; badly failed nodes ...

2015
Uzma Khan Shikha Agrawal Sanjay Silakari

VANETs enable wireless communication among vehicles and vehicle to infrastructure. Its main objective is to render safety, comfort and convenience on the road. VANET is different from ad-hoc networks due to its unique characteristics. However, because of lack of infrastructure and centralized administration, it becomes vulnerable to misbehaviors. This greatly threatens ing such a useful network...

2007
Sheng Zhong Murtuza Jadliwala Shambhu Upadhyaya Chunming Qiao

Last few years have seen extensive research being done in the area of localization algorithms for wireless, ad hoc computer and sensor networks. Despite the progress in the area of efficient localization algorithms, the problem of malicious beacon nodes has not received sufficient attention. In this paper, we study the robust localization problem in the presence of such nodes. In particular, we...

2008
Sinjae Lee Shaojian Zhu Yanggon Kim Juno Chang

A malicious peer’s behavior is one of the most challenging research areas of the P2P world. Our previous reputation-based trust model approach, which is based on the resource chain model (RCM), prevents malicious peers from spreading malicious contents among the open community. Moreover, a study on the malicious behavior over P2P community leads us to recognize a malicious node. The purpose of ...

2012
K. V. RAMANA N. S. V. SRINIVAS

In a Wireless Sensor Network a large number of sensors are deployed for the purpose of sensing data and then to bring the data back securely to nearby base stations. The base stations then perform the costly computation on behalf of the sensors to analyze the data sensed by the sensors. Due to resource limitations of the nodes and also due to the vulnerability of physical captures of the nodes,...

2013
Ruki Harwahyu Boma Anantasatya Adhi Harris Simaremare Abdusy Syarif Abdelhafid Abouaissa Riri Fitri Sari Pascal Lorenz

A node in Mobile Ad-hoc Network (MANET) solely depends on neighbor nodes for its connectivity to the outer networks. It is completely different with fixed network connection where a central infrastructure is providing connectivity to the outside network for all mobile nodes there. This kind of situation makes MANET easier to build rather than fixed network with certain infrastructure. However, ...

2015
M. Kannan E. Dinesh

Certificate revocation is an important security component in mobile ad hoc networks (MANET). Securing network from various kinds of Attacks (MANET) plays an important role. Certificate revocation mechanisms play an important role in securing a network. The main challenge of certificate revocation is to revoke certificates of malicious nodes promptly and accurately. In this paper we use Cluster ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید