نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

Journal: :I. J. Network Security 2006
Asad Amir Pirzada Chris McDonald

Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically insecure environment and, as a result, are vulnerable to capture and compromise. In addition, the nature of the wireless communication medium restricts enforcement of rigourous node memberships and so a number of maliciou...

2013
Mukesh Chand

All the nodes in the adhoc network may move randomly and able to join or leave any network, nodes in adhoc networks are operating as routers and workstation. Nodes are capable to discover and maintain routes to every other node in the network and to propagate packets accordingly. Autoconfiguration of mobile nodes is an important issue on self configurable networks. Autoconfiguration is needed t...

2013
Nadia Haddadou Abderrezak Rachedi

In this paper, we address the issue of the presence of malicious and selfish nodes in Vehicular Ad Hoc Networks (VANETs). Malicious nodes spread false and forged messages, while selfish nodes only cooperate for their own interest. To deal with this, we propose DTM, a Distributed Trust Model inspired by Spence’s Job Market model from Economics. In our model, a sender node transmits a signal with...

Journal: :CoRR 2015
Andrea Abrardo Mauro Barni Kassem Kallas Benedetta Tondi

The most common approach to mitigate the impact that the presence of malicious nodes has on the accuracy of decision fusion schemes consists in observing the behavior of the nodes over a time interval T and then removing the reports of suspect nodes from the fusion process. By assuming that some a-priori information about the presence of malicious nodes and their behavior is available, we show ...

2006
Yun Zhou Yanchao Zhang Yuguang Fang

Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious ‘‘new’’ nodes through many kinds of attacks. To prevent malicious nodes from joining the sensor network, acces...

2015
K. Suguna

The Wireless sensor network communication can be captured easily, therefore there is a need for security. To achieve security in wireless sensor network, key predistribution is essential. Key pre-distribution is a method of distribution of keys onto the nodes before deployment. Key pre-distribution schemes have been developed for the better maintenance of key management in wireless sensor netwo...

2008
Rahat Qureshi Min Chang Hesiri Weerasinghe Huirong Fu

Wireless sensor nodes have wide range of applications like monitoring data to surveillance ,healthcare to agriculture etc..In all these above monitoring system there is no any physical line of defense against data hacking and to stop malicious nodes, data stealing or destroying .So Intrusion Detection System(IDS) protects data from malicious nodes. In this paper we study to implement Intrusion ...

2015
Jing Deng Richard Han Shivakant Mishra

This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS constructs forwarding tables at each node to facilitate communication between sensor nodes and a base station. It minimizes computation, communication, storage, and bandwidth requirements at the sensor nodes at the expense of increased computation, communication, storage, and bandwidth requ...

2016
Jayashree S Patil

Mobile Ad-hoc Network (MANET) is a wireless network consisting of numerous nodes which are move every minute and are highly mobile. Basically, MANET is a self configuring network where nodes can enter the network and also leave the network in a random manner without prior notification to the network. This allows the malicious nodes to enter the network and attack other legitimate node. Hence, t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید