نتایج جستجو برای: routing attack
تعداد نتایج: 132575 فیلتر نتایج به سال:
Ad-hoc network is an autonomous mobile node. It is a set of temporary based networks, which has not fixed infrastructure. The Ad-hoc networks are very much positive towards attack by malicious node due to its vulnerabilities nature of routing protocols. There are large numbers of attacks affect the Ad-hoc networks. In between these attacks one is very much known as Black Hole Attack. In this pa...
The Mobile adhoc networks (MANETs) networks that are defined as the wireless self configuring networks that are capable of operating without the support of any fixed infrastructure and a central coordinator which makes the routing a complicated task. One of the main challenges in MANET is to design robust security solution that can protect MANET from various routing attacks. MANET is vulnerable...
Mobile Ad hoc Network (MANET) is a collection of mobile nodes that can communicate with each other using multihop wireless links without requiring any fixed based-station infrastructure and centralized management. Each node in the network acts as both a host and a router. In such scenario, designing of an efficient, reliable and secure routing protocol has been a major challenging issue over th...
A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. The nature of ad-hoc networks makes them vulnerable to attacks especially in routing protocols. Providing security in mobile adhoc networks has been a major issue over t...
Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, on...
The current interdomain routing protocol, Border Gateway Protocol, is limited in implementations of universal security. Because of this, it is vulnerable to many attacks at the AS to AS routing infrastructure. Initially, the major concern about BGP security is that malicious BGP routers can arbitrarily falsify BGP routing messages and spread incorrect routing information. Recently, some authors...
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is challenging. The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself t...
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
In mobile ad-hoc network (MANET), secure routing is a challenging issue due to its open nature, infrastructure less property and mobility of nodes. The lack of static infrastructure causes several issues in mobile ad hoc network (MANET) environment, such as node authentication and secure routing. In this paper we propose a new protocol for secure routing of data packets in MANET. The approach i...
Mobile Ad-hoc Network (MANET) is a self-configuring wireless network of movable and independent nodes which operate without the support of any permanent infrastructure, hence MANET has dynamic topology. In MANET, each node forwards traffic unrelated to its own use. Despite the proliferation of MANET, it is prone to various attacks which include blackhole attack, grayhole attack, flooding attack...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید