نتایج جستجو برای: black hole attack
تعداد نتایج: 253930 فیلتر نتایج به سال:
Mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized access point such as a base station. MANET has potential applications in very unpredictable and dynamic environments. The nodes, which act as a host as well as a router, communicate to each other through multi hops d...
Wireless Sensor Networks (WSN) are being increasingly used due to their wide range of applications in military and civilian domains. These networks are prone to security attacks. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional solutions of security, which needs complex calculations and more memory. There are many types of att...
DTNs are designed to work in post disaster scenario where partitions between nodes are large. To transfer messages in this situation DTN uses intermediate nodes to forward messages. The mechanism used here is store, carry and forward. But here, securely transferring messages from one node to other node is quite challenging task because an intermediate node may behaves maliciously. A malicious n...
Mobile ad hoc network (MANET) is an autonomous self-configuring infrastructure-less wireless network. MANET is vulnerable to a lot of routing security threats due to unreliability of its nodes that are highly involved in the routing process. In this paper, a new technique is proposed to enhance the security of one of the most popular MANET routing protocols that is called Ad hoc on Demand Dista...
In Mobile Adhoc Networks (MANETs), routing attacks are considered as a serious issue. However, in the presence of malicious nodes, the networks are affected by various kinds of attacks. The malicious node(s) can attack a MANET in different ways, such as sending fake messages several times; fake routing information and advertising fake links to disrupt routing operations. Black hole attacks are ...
Wireless mobile ad-hoc networks are those networks which has no physical links between the nodes. Due to the mobility of nodes, interference, multipath propagation and path loss there is no fixed topology in this network. Hence some routing protocol is needed to function properly for these networks. Many Routing protocols have been proposed and developed for accomplishing this task. The intent ...
The proposed paper is enhanced version of our previous paper” A cryptographic approach towards Black Hole Attack Detection” accepted in CNSA 2012 gives solution for false reply from a node and confirms reply is coming from destination node in Black Hole attack. This paper proposed an algorithm for detecting malicious node that drops packet and the node that gives false reply to the source node....
Now a day, security in Mobile Ad hoc Network (MANET) is very important issue. Due to dynamic topology and mobility of nodes, Mobile Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless network. Nodes of Mobile Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing...
There are issues in organizations that require new theoretical formulation. Hence, metaphorical theorizing is used in the study of organizations to interpret them and understand their complexities. In this method, the organization is likened to an entity and one of the key features of that entity is generalized to the organization. It should be borne in mind that most organizational theories ar...
Mobile ad hoc networks (MANETs) are infrastructure less networks which consist of dynamic collection of nodes with rapidly changing topologies of wireless links. MANETS are mobile and therefore, they use wireless connections to connect to various networks. Devices in range can communicate in a point-to-point fashion. MANETs are liable to different types of DoS attacks in which packets are dropp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید