نتایج جستجو برای: black hole attack

تعداد نتایج: 253930  

Journal: :IJNGC 2012
Sandhya Aneja Neelima Gupta

Properties of Mobile Ad hoc Networks (MANETs) present major vulnerabilities in security. The threats considered in MANETs may be due to maliciousness of a node that intentionally disrupts the network by using variety of attacks and/or due to selfishness of the node which does not perform certain operations due to a wish to save power. None of the existing algorithms to mitigate black hole attac...

Journal: :International Journal of Computer Applications 2015

Journal: :Journal of Al-Qadisiyah for computer science and mathematics 2017

Journal: :International Journal of Computer Applications 2017

Journal: :International Journal of Advanced Computer Science and Applications 2014

2016

Wireless Sensor Networks are a Collection of Sensor nodes.Wireless sensor network become so much popular in many fields due to its functionality i.e military, industrial area etc.Security is the important and critical issue in the Wireless networks due to the operating nature of WSNs. This Paper describe the security requirements as WSNs are easily prone more attacks than wired networks. This p...

2015
Gurpreet Singh

The Sensor nodes are connected wirelessly to form a network called as the wireless sensor network (WSN). The nodes have confined battery power and the battery of the nodes cannot be replaced. These sensor nodes are used for collecting the sensor data and transmits them to the sink or base station. This data transmission from a node to the other node utilizes more energy if the data is broadcast...

2015
Gursharan S Sidhu Rekha Garg

Mobile ad hoc networks (MANET) are accumulations of self arranging portable nodes with different topologies and have no altered foundation or infrastructure. MANETs do not have central organization; in this technology every node performs both host like a router and forward each packet among the network in multi-hop way. Because of the focal qualities like lack of centralized monitoring, dynamic...

Journal: :International Journal of Computer Applications 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید