نتایج جستجو برای: black hole attack

تعداد نتایج: 253930  

2013
Irshad Ullah

Wireless networks are gaining popularity to its peak in the present era and therefore appealing the users for wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network....

2017
Harsh Pratap Singh Rashmi Singh

Mobile ad hoc network (MANETs) is an infrastructure-less/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block...

Journal: :Computers & Mathematics with Applications 2010
Sudip Misra P. Venkata Krishna Kiran Isaac Abraham Navin Sasikumar S. Fredun

A Wireless mesh network is a wireless communication between different nodes which are dynamically self-organized and self-configured. The nodes in the network automatically establishing an ad-hoc network and maintaining the mesh connectivity, nodes communicate with each other by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routi...

Journal: :CoRR 2012
Rajib Das Bipul Syam Purkayastha Prodipto Das

A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack. In this paper,...

2015
Sandeep Kumar

Wireless Sensor Networks (WSN) is a trending technology now-a-days and has a wide range of applications such as battlefield surveillance, traffic surveillance, forest fire detection, flood detection etc. But wireless sensor networks are susceptible to a variety of potential attacks which obstructs the normal operation of the network. Black hole attack is one of severe security threat that affec...

Journal: :The International journal of Multimedia & Its Applications 2014

2015
P. S. HIREMATH

The Mobile adhoc networks (MANETs) networks that are defined as the wireless self configuring networks that are capable of operating without the support of any fixed infrastructure and a central coordinator which makes the routing a complicated task. One of the main challenges in MANET is to design robust security solution that can protect MANET from various routing attacks. MANET is vulnerable...

2015
Mohamed Elboukhari Mostafa Azizi Abdelmalek Azizi

A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of t...

2013
Harjeet Kaur Manju Bala Varsha Sahni

The wireless mobile ad-hoc network (MANET) is set of dissimilar types of mobile nodes. These nodes in MANET communicate with each other without any fixed infrastructure. Because of MANET’s infrastructure network is unprotected from the attacks of malicious nodes. One of the attacks is called black hole attack. In MANET black hole attack is occurring easily. In the black hole attack node falsie ...

2013
D. Geetha B. Revathi Nita Rotaru Elizabeth M. Royer Sanjay Ramaswamy Huirong Fu

A Mobile Ad-hoc Network (MANET) is a dynamic wireless network that can be formulated without the need for any pre-existing infrastructure in which each node can act as a router. One of the main challenges of MANET is the design of robust routing protocol that adapt to the frequent and randomly changing network topology. Several attacks are possible in the available routing protocols such as Wor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید