نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

Journal: :journal of advances in computer research 2014
iman zangeneh sedigheh navaezadeh abolfazl jafari

wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. the connection between nodes is provided by sending packages and by trusting to each other. therefore, using efficient and certain protocols is the essential requirement of these networks. due to special characteristics of wireless ad hoc networks such as lack of a fixed infrastructure, t...

2013
A. Francis Saviour Devaraj

------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------Mobile Adhoc Networks (MANET) are new paradigm of wireless networks providing unrestricted mobility to nodes with no fixed or centralized infrastructure. Each node participating in the network acts as router to route the data from source to destination. This...

2012
ARUNMOZHI ANNAMALAI VENKATARAMANI YEGNANARAYANAN

The risks to users of wireless technology have increased as the service has become more popular. Due to the dynamically changing topology, open environment and lack of centralized security infrastructure, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and to ad hoc routing attacks. There are a wide variety of routing attacks that target the weakness of MANETs. ...

2014
G. Vennila

MANET is a collection of wireless mobile node that communicating with each other without the use of network infrastructure. Each mobile node in mobile ad hoc network act as a host as well as router and willing to forward data to other nodes. A routing protocol is essential whose primary goal is to establish correct & well-organized route between pair of nodes, due to this reason, the routing pr...

2010
Christian Gottron André König Ralf Steinmetz

Distributed Hashtables (DHT), with Pastry [2] as a prominent representative, are one of the most recent peer-to-peer (P2P) architectures. DHTs scale well to the network size due to a small routing table and a hierarchical routing scheme. In Pastry, the number of routing entries scales logarithmically with respect to the number of participating nodes, because each node maintains route entries to...

1997
Brian Vetter Feiyi Wang Shyhtsun Felix Wu

It is critical to protect the network infrastructure (e.g., network routing and management protocols) against security intrusions, yet dealing with insider attacks are probably one of the most challenging research problems in network security. We study the security threats, especially internal/insider threats, for the standardized routing protocol OSPF. In OSPF, a group of routers collaborate, ...

2013
Harmandeep Singh Manpreet Singh

Wireless or mobile network is the new generation of wireless network that is different from the wired approach in many aspects like power and energy efficient routing protocols, routing configuration, network infrastructure. There are several protocols proposed for the deployment of MANETs in fields like government, military etc. In this paper we are proposing a technique to identify attack i.e...

Journal: :JIPS 2010
Lukman Sharif Munir Ahmed

Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastat...

2006
Bounpadith Kannhavong Hidehisa Nakayama Nei Kato Yoshiaki Nemoto Abbas Jamalipour

Rapid advances in wireless networking technologies have made it possible to construct a Mobile Ad hoc Network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, MANETs are vulnerable to various kinds of attacks which aim at disrupting their routing operations. To develop a strong security scheme to protect against these attacks it is n...

2013
D. Geetha B. Revathi Nita Rotaru Elizabeth M. Royer Sanjay Ramaswamy Huirong Fu

A Mobile Ad-hoc Network (MANET) is a dynamic wireless network that can be formulated without the need for any pre-existing infrastructure in which each node can act as a router. One of the main challenges of MANET is the design of robust routing protocol that adapt to the frequent and randomly changing network topology. Several attacks are possible in the available routing protocols such as Wor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید