نتایج جستجو برای: black hole attack
تعداد نتایج: 253930 فیلتر نتایج به سال:
Wireless Sensor Networks (WSN) is a rising innovation now-a-days and has an extensive variety of uses for example traffic surveillance, forest fire detection, battlefield surveillance, flood detection etc. but WSN can be affected by various attacks which obstructs ordinary operation of the system. Security and reliability of sensor network is less because of arbitrary architecture of sensor nod...
In this letter, we consider static black hole in f(R) gravity.We take advantage from corrected entropy and temperature and investigate such black hole. Finally, we study the $ P - V $ critically and phase transition of corrected black hole with respect to entropy and temperature. Here also, we obtain the heat capacity for the static black hole in $ f(R) $ gravity. This calculation help us...
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks. There are number of attacks on wireless sensor networks like black hole attack, sink hole attack ,Sybil attack ,selective forwarding attacks etc. in this paper we will concentrate...
Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.
Providing secure routing in MANET environment is a difficult task due to its distinct nature. In MANET, routing protocols are designed to cope with the network operations but in nature they are affecting by both internal and external attacks. Black hole attack is one kind of internal attack that affects routing operation by retaining all incoming packets. This type of attack is very hard to pre...
In the past few years, an evolution in wireless communication has been emerged, along with a new type large potential application of network appears, which is Mobile Ad-Hoc Network (MANET). Black hole attack consider one most affected kind on MANET. Therefore, use intrusion detection system (IDS) major importance MANET protection. this paper, optimization fuzzy based proposed automate process p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید