نتایج جستجو برای: routing misbehavior

تعداد نتایج: 54648  

2007
Andrea Valletta Alfredo Todini Andrea Baiocchi

It is well known that TCP experiences performance problems (unfairness and starvation) in multi-hop wireless networks. Such problems are often traced to the misbehavior of dynamic routing protocols in case of link failure. However, in this paper we show, through simulations, that unfairness and starvation of flows also take place with static routing; thus competition between TCP flows in a mult...

2015
C. VIJAYAKUMARAN T. LAKSHMANA KUMAR

Adversary detection in MANETs is very useful for scores of applications such as military, satellite, interplanetary and disaster rescue. Selfish antonyms and malicious behaviors represent a serious threat against routing in Mobile Ad-hoc Networks (MANETs). Due to the unique network characteristic, designing a misbehavior detection scheme in MANET is regarded as a great challenge. In this paper,...

Journal: :Network Protocols & Algorithms 2011
Radhika Priya Ankala D. Kavitha D. Haritha

A Mobile Adhoc Network (Manet) is a highly challenging environment due to its dynamic topology, limited processing capability, limited storage, band width constraints, high bit error rate and lack of central control. In this dynamic network, each node is considered as a mobile router. A malicious node can easily disrupt the proper functioning of the routing by refusing to forward routing messag...

Journal: :Peer-to-Peer Networking and Applications 2015
Gunhee Lee Wonil Kim Kangseok Kim Sangyoon Oh Dong-Kyoo Kim

The routing misbehavior is one of the most serious threats to wireless ad hoc networks where nodes are not forwarding messages correctly. Once the attack has been launched, nodes in the network are not able to send messages anymore. Thus it could be a kind of DoS (denial of service) attack. So far, in order to detect the attack, most researches employ a watchdog method although it is not effici...

2014
Bhagyashree S. Madan R. K. Krishna

A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes as routers. The operation of MANETs does not depend on pre-existing infrastructure or base stations. Network nodes in MANETs are free to move randomly. The nodes which drop the information to send forward considered as a selfish N...

Journal: :CoRR 2011
Abeer Ghandar Eman Shabaan Zaky Taha Fayed

Node misbehavior due to selfish or malicious behavior could significantly degrade the performance of MANET because most existing routing protocols in MANET aim to find the most efficient path. Overhearing and reputation based cooperation schemes have been used to detect and isolate the misbehaving nodes as well as to force them to cooperate. Performance analysis has been done for the network tr...

Journal: :CoRR 2013
Md. Amir Khusru Akhtar Gadadhar Sahoo

Noncooperation or failure to work together is a big challenge that surely degrades the performance and reliability of Mobile Adhoc Networks. In MANETs, nodes have dual responsibilities of forwarding and routing, that‟s why it needs unison with nodes. To sort out non-cooperation a real life behavior should be implemented, so that misbehavior is nullified. In this paper, we present the “Mirror Mo...

2013
Haojin Zhu Suguo Du Zhaoyu Gao Mianxiong Dong

Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic...

2014
S. Kirubakaran

Mobile Ad hoc Networks (MANET) use anonymous routing protocols that hide node identities and routes from outside observers in order to provide anonymity protection. Existing anonymous routing protocols relay on hop by hop encryption or redundant traffic by generation high cost. The high cost exacerbates the inherent resource constraint problem in MANETs. Existing anonymous routing protocols pro...

2007
Wenbo He Ying Huang Klara Nahrstedt Whay C. Lee

Intrusion/misbehavior detection and response are two important components for defending against various attacks in mobile ad hoc networks. Unfortunately, there is a gap between local intrusion/misbehavior detection and network-wide response in such networks. To bridge this gap, alert propagation, aiming to spread alert messages to the whole network upon detection of malicious/abnormal activity,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید