نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

2012
SHEN ZIHAO LIU SHUFEN

Wireless sensor networks have been widely used in many applications such as military monitoring, target tracking and surveillance. Security issue is need to more concern. Routing protocol is the core technology of the network layer in wireless sensor networks. Many attackers disrupt the network with routing attack, which will do serious damage to wireless sensor networks. Consider the scare ene...

2010
Moitreyee Dasgupta S. Choudhury N. Chaki Hoang Lan Nguyen Uyen Trang Nguyen L. Sankaranarayanan Yih-Chun Hu Adrian Perrig David B. Johnson H. Yang H Y. Luo F Ye S W. Lu D. B. Johnson D. A. Maltz C. Shields E. M. Belding-Royer

Rushing attack may cause more vulnerability in MANET as it can be used as a pre-requisite for launching some other types of Denial-of-Service attacks. Significant research efforts have been made towards increasing the survivability of MANET either by developing secure routing algorithms or by improving the robustness of MAC layer protocol in the presence of selfish or compromised nodes. Malicio...

2015
Vivek Tank Amit Lathigara

Mobile ad-hoc network abbreviated as MANET is most emerging and highly demanding wireless network technology. Due to the property of self-deliberate, where all point of network behaves like source or router and also all nodes are keeps on moving freely in network area. Mobile ad hoc network perform important role in connectionless environment. Security is the most fundamental requirement in mob...

2016
Sanjay Yadav

The minimization of power in wireless sensor network is big issue. If the process of energy constraints is optimized increase the reliability and security of mobile ADHOC network. The management of ADHOC network is great challenge due to dynamic infrastructure and mobility of node. Due to mobility of node routing path of network and security of communication suffered. In the process of node mob...

2013
Harjeet Kaur Manju Bala Varsha Sahni

The wireless mobile ad-hoc network (MANET) is set of dissimilar types of mobile nodes. These nodes in MANET communicate with each other without any fixed infrastructure. Because of MANET’s infrastructure network is unprotected from the attacks of malicious nodes. One of the attacks is called black hole attack. In MANET black hole attack is occurring easily. In the black hole attack node falsie ...

2006
Todd R. Andel

Formal security analysis of ad hoc routing protocols has historically been lacking, normally following non-formal inspection to identify flaws and attacks. This leads to a cycle of published development, attack, development, attack, ... . Recent formal models and methods attempt to introduce rigor into the analysis approach. We discuss flaws in a previously proposed security framework based on ...

2016
Sonia Padmavati Fan-Hsun Tseng Li-Der Chou Han-Chieh Chao Vimal Bibhu Ajay Rawat Santosh Sharma Arti Sharma Satendra Jain Anuj K. Gupta Anil K. Verma David B. Johnson Rajeev K. Shakya Mahesh K. Marina

Vehicle Ad-hoc Network is vulnerable to several attacks. One of the main attacks is the black hole attack which absorbs all the data packets in the network. In this paper, we have analyzed the performance of VANET in presence of black hole node by using different routing protocols AODV, DSR and AOMDV. This paper analyzed that which protocol is more vulnerable to the black hole attack and how mu...

2016
Max Schuchard Nicholas Hopper

An increasing number of systems have been proposed or deployed to the transit core of the Internet with the goal of observing and manipulating traffic in flight, systems we term Traffic Manipulating Boxes. Examples of these include: decoy routing systems, surveillance infrastructure like the NSA’s alleged QUANTUM project, and traffic shaping middleboxes. In this work, we examine a new approach ...

2013
Sonia

Vehicle Ad-hoc Network is vulnerable to several attacks. One of the main attacks is the black hole attack which absorbs all the data packets in the network. In this paper, we have analyzed the performance of VANET in presence of black hole node by using different routing protocols AODV, DSR and AOMDV. This paper analyzed that which protocol is more vulnerable to the black hole attack and how mu...

2013
Ravi Kant Sunil Gupta Harsh Khatter

A Mobile ad-hoc network (MANET) is a latest and emerging Research topic among researchers. The reason behind the popularity of MANET is flexibility and independence of network infrastructure. MANET have some unique characteristic like dynamic network topology, limited power and limited bandwidth for communication. MANET has more challenge compare to any other conventional network. The most comm...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید