نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

2015
Akansha Shrivastava Rajni Dubey

Security is the one of the major issue that exists in Mobile Ad hoc network. Mobile Ad hoc network is infrastructure less network so it is vulnerable to several security attacks that are on different layers. Wormhole attack is one of the serious routing attack on network layer. This paper focuses on the wormhole attack, its classification and the modes by which they are launched. This paper sum...

2012
Harmandeep Singh Gurpreet Singh Manpreet Singh

There are several routing protocols that have been proposed for the possible deployment of MANETs in many fields like military, government and commercial applications. While the routing aspects of MANETs are already well understood but the research activities about the security in MANETs are still at their beginning. This paper focuses on the performance investigation of reactive and proactive ...

Journal: :JCP 2013
Ting Han Shoushan Luo Hongliang Zhu Yang Xin Yong Peng

The trust solutions to routing networks are faced with the evaluation of behavior trust and how to exactly evaluate the behaviors under the circumstance of existing recommend deceptive behavior such as providing fake or misleading recommendation. In this paper, by learning trust relationship from routing network, a trust evaluation model based on Grey Clustering Theory is proposed. The model ad...

2012
Heena Ahuja Jyoti Gupta

In this paper, we tackle the malicious attacks in Underwater Sensor Networks (UWSNs). Underwater Sensor Networks (UWSNs) consists of variable number of sensors and vehicles that are deployed to perform collaborative monitoring tasks over a given area. In this paper, we use a novel routing protocol, called vector-based forwarding (VBF) protocol, to provide robust, scalable and energy efficient r...

2005
Haim Zlatokrilov Hanoch Levy

The traditional single (shortest) path routing paradigm leaves sessions vulnerable to a variety of security threats, especially eavesdropping. We propose to overcome this via dispersive routing, conducted over multiple paths. This increases significantly the costs inflicted on an attacker who wishes to eavesdrop or conduct DoS attack on network sessions by hijacking network links (or routers)1.

Journal: :International Journal of Electronics and Communication Engineering 2014

Journal: :International Journal of Computer Applications 2013

Journal: :Journal of communications software and systems 2021

Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as host and router. networks are characterized by the lack preexisting infrastructures or centralized administration. So, they vulnerable to several types attacks, especially Blackhole attack. This attack one most serious attacks in this kind mobile networks. In type attack, malicious sends false answer in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید