منابع مشابه
CEAACK based Detector for Malicious Nodes
MANET stands for Mobile Ad Hoc Network. The Ad Hoc network that is used for mobile communication is called MANET. The MANETS are used when the user is moving. Because MANET does not depends on fixed infrastructure. Wireless networks are used to connect with different networks in MANETs. Security is more critical in wireless communication when compared to the wired communication. So the security...
متن کاملAutomatic Hybrid Detector for Spontaneous Detection of Malicious nodes in MANET’s
-MANET capabilities are expected to be an overall driving force for next-generation wireless functionalities. These multihop networks the burden of routing packets from source to destination. Each Node handles part of the management of the network. Fault detection is extremely difficult because of the distributed design. In this paper we propose a novel scalable protocol which has virtual archi...
متن کاملOn agent-based aggregation schemes in networks with malicious nodes
Mobile agents can be used to efficiently aggregate information in sensor networks. The originator aims at obtaining the correct result, even in the presence of byzantine nodes or a malicious aggregator agent. Secure information aggregation considers these situations. We propose to use a mobile agent for the hierarchical in-network aggregation scheme of Chan et al. and we introduce a greedy stra...
متن کاملLOCOMO: Distance-based Localization against Malicious Beacon Nodes
Last few years have seen extensive research being done in the area of localization algorithms for wireless, ad hoc computer and sensor networks. Despite the progress in the area of efficient localization algorithms, the problem of malicious beacon nodes has not received sufficient attention. In this paper, we study the robust localization problem in the presence of such nodes. In particular, we...
متن کاملHidost: a static machine-learning-based detector of malicious files
Malicious software, i.e., malware, has been a persistent threat in the information security landscape since the early days of personal computing. The recent targeted attacks extensively use non-executable malware as a stealthy attack vector. There exists a substantial body of previous work on the detection of non-executable malware, including static, dynamic, and combined methods. While static ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2014
ISSN: 0975-8887
DOI: 10.5120/19022-0534