نتایج جستجو برای: malicious nodes
تعداد نتایج: 141332 فیلتر نتایج به سال:
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Therefore, sensor networks need to support an authentication service for sensor identity and message transmission. Furthermore, intrusion detection and prevention schemes are always integrated in sensor security appliances s...
Researchers show that network coding can greatly improve the quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution attacks where malicious nodes inject into the network bogus data blocks that will be combined with other legitimate blocks at downstream nodes, leading to incapability of decoding the original blocks and degradation of net...
In mobile ad hoc networks (MANETs), the malicious flooding attack is very hazardous since it not only clogs the victim node but also the entire network. Also it may cause packet drops or alteration of the routing message that will further result in network dysfunctioning. In this paper, we propose a swarm based detection and defense technique for malicious attacks in mobile ad hoc networks (MAN...
In this paper, a robust distributed malicious node detection and precise localization and tracking method is proposed for Cluster based Mobile Ad hoc Network (MANET). Certificate Authority (CA) node is selected as the most stable node among trusted nodes, surrounded by Registration Authority nodes (RAs) in each cluster to generate the Dynamic Demilitarized Zone (DDMZ) to defend CA from probable...
Proposes a secure routing protocol tolerant of faulty or malicious nodes. They consider malicious nodes that tries to create routing loops, misdirects packets, or selectively drops packets. Their algorithm detects malicious links after log n faults where n is the length of the path. Since the protocol relies on packet acks to determine whether the node has reached the destination, the applicabi...
620 www.ijergs.org Improved Reliable Based Node Classification Using Dissect Method in Mobile AD HOC Network Mr. N. SENTHIL KUMARAN, M.C.A. , M.Phil., R.MOHANA PRIYA, ASSISTANT PROFESSOR & HEAD, M.PhilFULL TIME RESEARCH SCHOLAR, DEPARTMENT OF COMPUTER APPLICATION, DEPARTMENT OF COMPUTER SCIENCE, VELLALAR COLLEGE FOR WOMEN, ERODE, INDIA. VELLALAR COLLEGE FOR WOMEN, ERODE, INDIA. n.senthilkumaran...
Since the resource of nodes can access and leave the Grid system freely, it is possible some malicious nodes exist in the Grid environment. In addition, the numbers and qualities of nodes’ resource can be changed dramatically and optionally, so these malicious nodes must be affecting the utilization of Grid resource. Hence, the trust management mechanisms are developed and widely used in the re...
In a mobile ad-hoc network, nodes cannot rely on any fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. However, the absence of any trusted third party in such networks may result in nodes deviating from the routing protocol for selfish or malicious reasons. The concept of trusted routing has been promoted to handle the problems selfish and mali...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید