نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

Journal: :Trans. Large-Scale Data- and Knowledge-Centered Systems 2013
Emmanuelle Anceaume Yann Busnel Sébastien Gambs

We study the problem of achieving uniform and fresh peer sampling in large scale dynamic systems under adversarial behaviors. Briefly, uniform and fresh peer sampling guarantees that any node in the system is equally likely to appear as a sample at any non malicious node in the system and that infinitely often any node has a non-null probability to appear as a sample of honest nodes. This sampl...

2014
Dmitriy Kuptsov

Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Dmitriy Kuptsov Name of the doctoral dissertation Improving Dependability of Networks with Penalty and Revocation Mechanisms Publisher School of Science Unit Department of Computer Science and Engineering Series Aalto University publication series DOCTORAL DISSERTATIONS 185/2014 Field of research Telecommunications Software Ma...

Journal: :Computer Communications 2008
Imran Raza Syed Asad Hussain

This paper presents a guard node based scheme to identify malicious nodes in Ad hoc on-Demand Vector (AODV) protocol. Each node calculates trust level of its neighboring nodes for route selection. Trust calculation process involves opinions of other nodes about the node whose trust level is to be determined. If a neighboring node has a trust level lower than predefined threshold value. it’s ide...

2013
Carlos R. Perez Carlos Perez N. B. Shroff E. J. Coyle

Perez, Carlos R. M.S.E.C.E., Purdue University, December, 2007. Reputation-based Resilient Data Aggregation in Sensor Network . Major Professor: Saurabh Bagchi. Data aggregation, or the fusing of many sensor measurements into a single summary, has been proposed as an important primitive in wireless sensor networks. But data aggregation is vulnerable to security attacks and natural failures wher...

2009
Oly Mistry Anil Gürsel Sandip Sen

Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible to physical damage or remote tampering. Generally, a hierarchical data collection scheme is used by the sensors to report data to the base station. It is difficult to precisely identify and eliminate a tampered node i...

2007
Rubinder Kaur Kestina Rai Inderjeet

Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common design goal of reactive, proactive, and hybrid ad hoc routing protocols is to faithfully route packets from a source node to a destination node while maintaining a satisfactory level of service in a resource-constrained...

Journal: :Wireless Personal Communications 2022

The exposure of IoT nodes to the internet makes them vulnerable malicious attacks and failures. These failures affect survivability, integrity, connectivity network. Thus, detection elimination in a timely manner become an important factor maintain network connectivity. Trust-based techniques are used understanding behavior proposed conventional trust models power-hungry demand large storage sp...

Journal: :IEEE Access 2023

Irrespective of whether the environment is wired or wireless, routing an important challenge in networks. Since mobile ad hoc networks (MANETs) are flexible and decentralized wireless networks, very difficult. Furthermore, malicious nodes existing MANET can damage performance network. Recently, reinforcement learning has been proposed to address these problems. Being a algorithm, Q-learning mec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید