نتایج جستجو برای: malicious nodes
تعداد نتایج: 141332 فیلتر نتایج به سال:
In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to multiple locations in the network, such as by employing simple robotic platforms or moving the nodes by hand, he can evade schemes that attempt to ...
Objectives: To detect rank attacks during topology establishment and updated the RPL Destination Oriented Directed Acyclic Graph (DODAG) formation algorithm. The algorithm’s distributed module runs across all participating nodes, while centralized in sink. Methods: integrity authenticity of control messages transmitted among two nodes sink are verified using a lightweight Hashed Message Authent...
The use of Mobile Ad-hoc Networks (MANETs) has increased manifold in recent times. Reactive routing protocols like AODV [6] and DSR [7], used in MANETs, flood the network with route requests whenever a new route is to be discovered. This technique of flooding can be easily misused by malicious nodes to disrupt the network. Generally all nodes have a limit beyond which requests cannot be sent. M...
We present geographical secure path routing, an infrastructure free geographic routing protocol, that is resilient to disruptions caused by malicious or faulty nodes. Geographic locations of anonymous nodes are authenticated in order to provide location authentication and location privacy simultaneously. Our protocol also authenticates the routing paths taken by individual messages. This provid...
Mobile Ad-hoc Network (MANET) is a self configuring network which allows nodes to enter the network and also leave the network in a random manner without notification to the network. This dynamic nature allows the malicious nodes to enter the network and attack other legitimate node. To ensure the security in network it is necessary to detect attacks or malicious nodes and notify the network. I...
The vehicular ad hoc network is the decentralized type of network in which mobile nodes can communicate with each other. Due to self configuring nature of the network malicious nodes join the network which are responsible to trigger various types of active and passive attacks in the network. The jamming attack is the active type of attack in which malicious node select the nodes which will be c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید