نتایج جستجو برای: malicious nodes
تعداد نتایج: 141332 فیلتر نتایج به سال:
As mobile ad hoc networks (MANETs) are increasingly deployed in critical environments, security becomes a paramount issue. The dynamic and decentralized nature of MANETs makes their protocols very vulnerable to attacks, for example, by malicious insiders, who can cause packets to be misrouted or cause other nodes to have improper configuration. This paper addresses security issues of auto-confi...
The wireless mobile ad-hoc network (MANET) is set of dissimilar types of mobile nodes. These nodes in MANET communicate with each other without any fixed infrastructure. Because of MANET’s infrastructure network is unprotected from the attacks of malicious nodes. One of the attacks is called black hole attack. In MANET black hole attack is occurring easily. In the black hole attack node falsie ...
The intrinsic nature of wireless ad hoc networks makes them vulnerable to various passive or active attacks. Thus, there is no guarantee that a routed communication path is free of malicious nodes that will not comply with the employed protocol and attempt to interfere the network operations. In this paper, we survey the problem of secure routing in ad hoc wireless networks, and discuss the rel...
A serious threat to cognitive radio networks that sense the spectrum in a cooperative manner is the transmission of false spectrum sensing data by malicious sensor nodes. SNR fluctuations due to wireless channel effects complicate handling such attackers even further. This enforces the system to acquire authentication. Actually, the decision maker needs to determine the reliability or trustwort...
A mobile ad hoc network (MANET) is a self-organized wireless short-lived network consisting of mobile nodes. The mobile nodes communicate with one another by wireless radio links without the use of any pre-established fixed communication network infrastructure. The mobile nodes are vulnerable to different types of security attacks that allow interception, injection, and interference of communic...
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nodes could greatly degrade the network performance and might even result in a total communication breakdown. However, the majority of ad hoc networks secure routing protocols assumed that all nodes participating in the ...
Wireless networks are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and wish to conserve their own limited resources such as power, or for other reasons. The wireless nature and inherent features of mobile ad hoc networks...
Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming instantaneous network with dynamic topology. Each node simultaneously as both router and host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to drained conditions. Low Energy Aware Cluster Hierarchy (LEACH) is a most popular dynamic clustering protocol for WSN. Deployme...
Heterogeneous wireless sensor networks (HWSNs) can achieve more tasks and prolong the network lifetime. However, they are vulnerable to attacks from the environment or malicious nodes. This paper is concerned with the issues of a consensus secure scheme in HWSNs consisting of two types of sensor nodes. Sensor nodes (SNs) have more computation power, while relay nodes (RNs) with low power can on...
This paper is to prepare guidelines for providing security functions that protect USN middleware system resources from malicious nodes by providing authentication, authorization and confidentiality for middleware connection nodes (applications/manager, sensor network) to make USN middleware safe.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید