نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

2005
Tao Song Calvin Ko Chinyang Henry Tseng Poornima Balasubramanyam Anant Chaudhary Karl N. Levitt

As mobile ad hoc networks (MANETs) are increasingly deployed in critical environments, security becomes a paramount issue. The dynamic and decentralized nature of MANETs makes their protocols very vulnerable to attacks, for example, by malicious insiders, who can cause packets to be misrouted or cause other nodes to have improper configuration. This paper addresses security issues of auto-confi...

2013
Harjeet Kaur Manju Bala Varsha Sahni

The wireless mobile ad-hoc network (MANET) is set of dissimilar types of mobile nodes. These nodes in MANET communicate with each other without any fixed infrastructure. Because of MANET’s infrastructure network is unprotected from the attacks of malicious nodes. One of the attacks is called black hole attack. In MANET black hole attack is occurring easily. In the black hole attack node falsie ...

2003
Wensheng Zhang R. Rao Guohong Cao George Kesidis

The intrinsic nature of wireless ad hoc networks makes them vulnerable to various passive or active attacks. Thus, there is no guarantee that a routed communication path is free of malicious nodes that will not comply with the employed protocol and attempt to interfere the network operations. In this paper, we survey the problem of secure routing in ad hoc wireless networks, and discuss the rel...

Journal: :Wireless Sensor Network 2011
Mohammad Akbari Abolfazl Falahati

A serious threat to cognitive radio networks that sense the spectrum in a cooperative manner is the transmission of false spectrum sensing data by malicious sensor nodes. SNR fluctuations due to wireless channel effects complicate handling such attackers even further. This enforces the system to acquire authentication. Actually, the decision maker needs to determine the reliability or trustwort...

Journal: :Network Protocols & Algorithms 2011
Kuncha Sahadevaiah P. V. G. D. Prasad Reddy

A mobile ad hoc network (MANET) is a self-organized wireless short-lived network consisting of mobile nodes. The mobile nodes communicate with one another by wireless radio links without the use of any pre-established fixed communication network infrastructure. The mobile nodes are vulnerable to different types of security attacks that allow interception, injection, and interference of communic...

Journal: :JCM 2008
Yihui Zhang Li Xu Xiaoding Wang

In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nodes could greatly degrade the network performance and might even result in a total communication breakdown. However, the majority of ad hoc networks secure routing protocols assumed that all nodes participating in the ...

2014
N. Karthikeyan Dr. M. Ravindran

Wireless networks are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and wish to conserve their own limited resources such as power, or for other reasons. The wireless nature and inherent features of mobile ad hoc networks...

2013
Meenakshi Tripathi V. Laxmi

Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming instantaneous network with dynamic topology. Each node simultaneously as both router and host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to drained conditions. Low Energy Aware Cluster Hierarchy (LEACH) is a most popular dynamic clustering protocol for WSN. Deployme...

Journal: :Sensors 2016
Shichao Mi Hui Han Cailian Chen Jian Yan Xin-Ping Guan

Heterogeneous wireless sensor networks (HWSNs) can achieve more tasks and prolong the network lifetime. However, they are vulnerable to attacks from the environment or malicious nodes. This paper is concerned with the issues of a consensus secure scheme in HWSNs consisting of two types of sensor nodes. Sensor nodes (SNs) have more computation power, while relay nodes (RNs) with low power can on...

2011
Taeseung Lee Dongho Won Namje Park

This paper is to prepare guidelines for providing security functions that protect USN middleware system resources from malicious nodes by providing authentication, authorization and confidentiality for middleware connection nodes (applications/manager, sensor network) to make USN middleware safe.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید