An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Sinkhole Attack on DSR in MANET

MANET is a collection of wireless mobile node that communicating with each other without the use of network infrastructure. Each mobile node in mobile ad hoc network act as a host as well as router and willing to forward data to other nodes. A routing protocol is essential whose primary goal is to establish correct & well-organized route between pair of nodes, due to this reason, the routing pr...

متن کامل

Mitigating Black Hole attack in MANET by Extending Network Knowledge

The Optimized Link State Routing Protocol is developed for Mobile Ad Hoc Network. It operates as a table driven, proactive protocol. The core of the OLSR protocol is the selection of Multipoint Relays (MPRs), used as a flooding mechanism for distributing control traffic messages in the network, and reducing the redundancy in the flooding process. A node in an OLSR network selects its MPR set so...

متن کامل

Mitigating Technique to Overcome DDOS Attack

Mitigating Technique to Overcome DDOS Attack V.PRAVEENA Department of Computer Science and Engineering Dr.N.G.P. Insttitute of Technology Kalapatti road, Coimbatore641 048. Tamilnadu. India [email protected] _________________________________________________________________________________________ Abstract: In this paper, we explore a new scheme for filtering spoofed packets (DDOS attack) w...

متن کامل

A PDRR based detection technique for blackhole attack in MANET

An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy...

متن کامل

EigenTrustp++: Attack resilient trust management

This paper argues that trust and reputation models should take into account not only direct experiences (local trust) and experiences from the circle of ”friends”, but also be attack resilient by design in the presence of dishonest feedbacks and sparse network connectivity. We first revisit EigenTrust, one of the most popular reputation systems to date, and identify the inherent vulnerabilities...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2014

ISSN: 0975-8887

DOI: 10.5120/16746-7051