A Secure and Efficient Method for Detecting Malicious Nodes in MANET
نویسندگان
چکیده
منابع مشابه
An Efficient and Secure System for Detecting Malicious Nodes in Mobile Ad hoc Networks
Recent advances in portable computing and wireless technologies are opening up exciting possibilities for the future of wireless mobile networking. A Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications among all the contemporary wireless networks. It consists of mobile platforms which are free to move arbitrarily. They do not need a fixed infrastructure and the ne...
متن کاملDetecting Selfish and Malicious Nodes in MANETs
Mobile ad-hoc networks (MANETs) rely on cooperation of all participating nodes. Thus they are vulnerable to selfish nodes using the net without providing own ressources, as well as malicious nodes attacking the net infrastructure. This paper outlines important attacks and summarizes popular approaches to design secure MANET protocols in order to detect selfish and malicious nodes and to enforce...
متن کاملComparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks
Remotely deployed sensor networks are vulnerable to both physical and electronic security breaches. The sensor nodes, once compromised, can send erroneous data to the base station, thereby possibly compromising network effectiveness. We assume that sensor nodes are organized in a hierarchy and use offline neural network based learning technique to predict the data sensed at any node given the d...
متن کاملpassivity in waiting for godot and endgame: a psychoanalytic reading
this study intends to investigate samuel beckett’s waiting for godot and endgame under the lacanian psychoanalysis. it begins by explaining the most important concepts of lacanian psychoanalysis. the beckettian characters are studied regarding their state of unconscious, and not the state of consciousness as is common in most beckett studies. according to lacan, language plays the sole role in ...
MANET: Detecting Critical Nodes for Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common design goal of reactive, proactive, and hybrid ad hoc routing protocols is to faithfully route packets from a source node to a destination node while maintaining a satisfactory level of service in a resource-constrained...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartC
سال: 2005
ISSN: 1598-2858
DOI: 10.3745/kipstc.2005.12c.5.617