نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

2015
Pooja Nayak

In mobile ad hoc networks, nodes have the inherent ability to move. Aside from conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, malicious nodes get better payoffs with the ability to move. In this paper, we propose a game theoretic framework to analyze the strategy profiles for regular and malicious nodes. We model the situation as a dynamic Bayes...

Journal: :International Journal of Research in Advent Technology 2019

Journal: :International journal of emerging science and engineering 2022

Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard devices central administration. The network is wireless and can communicate with each other. First foremost, a reliable effective intrusion detection system (NIDS) must be installed maintained. A system's data should protected against ac...

Journal: :JCIT 2010
Xu Xiang Jianguo Chen

In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To address this issue, we propose a secure protocol which consists of two phases: detecting malicious nodes and bypassing them. We present a novel efficient routing strategy called tracer routing to control routing progr...

2015
Bobby Sharma

Mobile ad hoc networks (MANETs) are a collection of mobile nodes that communicates over wireless media. Performance of MANET depends on the cooperative participation of nodes in packet forwarding. During packet forwarding from source to destination, it takes help of middle hop depending on the distance. Middle hops play different role in different times. Nodes in MANETs suffer from limited reso...

2004
Sirisha Medidi Muralidhar Medidi Sireesh Gavini Richard L. Griswold

Mobile Ad-hoc networks (MANETs) are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. This makes the network susceptible to Byzantyne faults with packets getting misrouted or dropped. This paper proposes solutions using an unobtrusive monitoring technique to locate malicious or faulty nodes that misroute or drop packets. This techniq...

2013
Nikhil Batra

Malicious nodes in wireless sensor network cause serious effects on critical factors like network lifetime, energy consumption and congestion control causing delay in delivery of messages. A lot of methods are being used to detect malicious nodes. In this paper we try to overcome the limitations of existing Watchdog method. For this we propose the method of detection of malicious nodes using se...

Journal: :IJAHUC 2011
Mani Zarei Amir Masoud Rahmani Razieh Farazkish

In Wireless Sensor Networks (WSNs) the existence of malicious nodes is a serious challenge. Malicious nodes increase the traffic by sending distrusted messages. In this paper, we present CCTF: a congestion control protocol based on trustworthiness of nodes in WSNs using fuzzy logic. Through the use of CCTF, each node reduces malfunctioning neighbour(s) effects via dropping valueless packets and...

2011
Ahmed M. Abd El-Haleem Ihab A. Ali

In a m obile ad-hoc network, nodes cannot rely on a ny fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. H owever, performing network functions consumes energy and other resources. Therefore, some network nodes may decide against cooperating with others; selfish nodes. Also security issues are more paramount in such networks even more so than i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید