نتایج جستجو برای: routing attack

تعداد نتایج: 132575  

2013
L. SRIDHARA RAO ALI HUSSAIN SATYA RAJESH Satya Rajesh

Mobile ad hoc networks (MANETs) are a set of mobile nodes which over a shared wireless medium communicate with each other without the presence of a predefined infrastructure or a central authority. [1]. The absence of a central management agency or a fixed infrastructure is a key feature of MANETs. Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attack...

2013
Irshad Ullah

Wireless networks are gaining popularity to its peak in the present era and therefore appealing the users for wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network....

2014
Devendra Kumar Deepak Kumar Xaxa

The mobile nodes in MANETs dynamically change their topology and hence require an efficient mechanism to communicate with each other. There are number of routing protocols anticipated for MANET environment categorized as Location based routing protocols and Non-Location based routing protocols. In MANETs, Location based routing protocols are preferred as they are more efficient in routing compa...

2013

1 Enhancing security features & performance of AODV protocol under attack for MANET In this paper, a novel security mechanism is presented to enhance security & performance of AODV (Adhoc On-demand Distance Vector) routing protocol under the attack for MANET (Mobile Ad-hoc Networks). The AODV routing protocol was initially developed without considering security in mind. So it is not able to def...

2014
S Sharmila

This paper investigates one of the most severe routing attacks in sensor networks, namely sinkhole attack. A compromised node tries to draw all or as much traffic as possible from a particular area, by making it look attractive to the surrounding nodes with respect to the underlying routing metric. The detection of sinkhole attack in wireless sensor networks is proposed using an enhanced double...

2012
Govind Sharma Manish Gupta

Mobile Ad-hoc network (MANET) has become an individual part for communication for mobile device. Therefore, interest in research of Mobile Ad-hoc network has been growing since last few years. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared ...

Journal: :Wireless Communications and Mobile Computing 2014
Juan Chen Hongli Zhang Xiaojiang Du Binxing Fang Liu Yan

A base station is the controller and the data-receiving center of a wireless sensor network. Hence, a reliable and secure base station is critical to the network. Once an attacker locates the base station, he or she can do many damages to the network. In this paper, we examine the base station location privacy problem from both the attack and defense sides. First, we present a new attack on bas...

2015
Moirangthem Marjit Singh Ankita Singh Jyotsana Kumar Mandal

Black hole attack is a very common type of security attack found in Mobile Adhoc Network (MANET). In Black hole attack, the malicious node attracts all the data packets towards it using some false means and affects the data transmission in many ways, such as dropping of the packets. Black hole attack is vulnerable to security in MANET routing protocol. The paper focuses to provide a snapshot on...

2017
Shivani Gaba

A Wireless ad-hoc network is an impermanent network set up by wireless mobile nodes moving random in those spots which have no network framework (infrastructure) or incorporated (centralized) access point. Since the independent nodes have ability to interconnect with each other, they collaborate with one another by sending information packets to different nodes in the system. Thusly the nodes d...

2012
Purushottam Patel Rupali Soni

Routing is a easiest way to launch a attack in MANET due to highly dynamic topology which makes routing procedure more complicated and insecure and therefore nodes are more susceptible to compromise and are particularly vulnerable to denial of service attack (DoS) attacks launched by malicious nodes or intruders .Another challenging issue is selfishness of a node which dramatically decreases th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید