Individual Security and Network Design with Malicious Nodes
نویسندگان
چکیده
منابع مشابه
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
This paper presents a guard node based scheme to identify malicious nodes in Ad hoc on-Demand Vector (AODV) protocol. Each node calculates trust level of its neighboring nodes for route selection. Trust calculation process involves opinions of other nodes about the node whose trust level is to be determined. If a neighboring node has a trust level lower than predefined threshold value. it’s ide...
متن کاملDetecting Selfish and Malicious Nodes in MANETs
Mobile ad-hoc networks (MANETs) rely on cooperation of all participating nodes. Thus they are vulnerable to selfish nodes using the net without providing own ressources, as well as malicious nodes attacking the net infrastructure. This paper outlines important attacks and summarizes popular approaches to design secure MANET protocols in order to detect selfish and malicious nodes and to enforce...
متن کاملMalicious Data and Computer Security
Traditionally, computer security has focused on containing the effects of malicious users or malicious programs. However, as programs become more complex, an additional threat arises: malicious data. This threat arises because apparently benign programs can be made malicious, or subverted, by introduction of an attacker’s data—data that is interpreted as instructions by the program to perform a...
متن کاملAn Optimal Agreement in a Cluster-based Wireless Sensor Network with Malicious Faulty Nodes
A cluster of sensor nodes in Cluster-based Wireless Sensor Network (CWSN) is cooperating to achieve some objectives. For CWSN, the fault-tolerance and reliability has been an important topic. The problem of reaching agreement in the distributed system is one of the most important issues to design a fault-tolerance system. In previous works, reach a common agreement among healthy nodes to cope w...
متن کاملNetwork Data Security System Design with High Security Insurance
Because of the availability of relatively large bandwidth, computers worldwide are connected via a network. Computer users can transfer information and exchange data easily on the Internet, and as a result, many network data servers have been set up. With this growth, ensuring data security during storage and transmission has become very important. In our project, a channel coding and encryptio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information
سال: 2018
ISSN: 2078-2489
DOI: 10.3390/info9090214