Detection of Routing Misbehavior in MANETs with 2ACK scheme
نویسندگان
چکیده
منابع مشابه
A Reputation Based Scheme to Prevent Routing Misbehavior in Manets
Mobile Ad Hoc Network (MANET) system is not only subject to most of the well known attacks and threats that the wired and conventional wireless network suffered, but also a large number of additional attacks and threats. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Security is not a single layer issue but a mult...
متن کاملA Probabilistic Misbehavior Detection Scheme on Trust Establishment in Manets
Adversary detection in MANETs is very useful for scores of applications such as military, satellite, interplanetary and disaster rescue. Selfish antonyms and malicious behaviors represent a serious threat against routing in Mobile Ad-hoc Networks (MANETs). Due to the unique network characteristic, designing a misbehavior detection scheme in MANET is regarded as a great challenge. In this paper,...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کامل―Routing of Misbehavior Nodes in Manets Using Acknowledgement Method‖
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes as routers. The operation of MANETs does not depend on pre-existing infrastructure or base stations. Network nodes in MANETs are free to move randomly. The nodes which drop the information to send forward considered as a selfish N...
متن کاملA Survey of Misbehavior Detection Scheme in DTN
The survey tries to review the various problems and their solution in Delay Tolerant Network (DTN) while routing the packets. In this paper, going to discuss and see the overview of various methods used in the DTN. They are simbet and bubble rap which are the DTN routing algorithm and is used for identify the bridge nodes using betweenness centrality and similarity metrics in the network. Then ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2011
ISSN: 2158-107X,2156-5570
DOI: 10.14569/ijacsa.2011.020119