نتایج جستجو برای: routing misbehavior

تعداد نتایج: 54648  

Journal: :CoRR 2010
Martin Drozda Sebastian Schildt Sven Schaust Helena Szczerbicka

We propose and evaluate an immuno-inspired approach to misbehavior detection in ad hoc wireless networks. Node misbehavior can be the result of an intrusion, or a software or hardware failure. Our approach is motivated by co-stimulatory signals present in the Biological immune system. The results show that co-stimulation in ad hoc wireless networks can both substantially improve energy efficien...

Journal: :The Open Psychology Journal 2022

Background: Student misbehavior is disrupted during the teaching-learning process, creating psychological and physical discomfort that affects achievement of educational goals. Aim: The current study was to explore relationship between teachers’ coping styles classroom management strategies toward student misbehaviour. Methods: researchers used a correlational research design. Results: independ...

Nowadays, promoting academic loyalty and ethics and coping with research misbehavior, including plagiarism, forgery and misrepresentation have become an important part of the university mission, since the normalization of research misconduct undermines the integrity and loyalty of science, the link between science, society, industry, and damages the reputation of scientific institutions. Accord...

2014
J C Kavitha

MANETs are based on wireless multi-hop communication. To ensure correct operation, nodes need to cooperate and forward messages from other nodes. However there can be misbehaving nodes that can silently drop packets. Such misbehaviors can be either an individual node misbehavior or misbehavior of nodes in collusion. In this paper, a new approach is proposed to identify and mitigate the packet d...

Journal: :CoRR 2010
R. Kalaiarasi Getsy S. Sara S. Neelavathy Pari D. Sridharan

Mobile Ad Hoc Network (MANET) is a collection of nodes that can be rapidly deployed as a multi-hop network without the aid of any centralized administration. Misbehavior is challenged by bandwidth and energy efficient medium access control and fair share of throughput. Node misbehavior plays an important role in MANET. In this survey, few of the contention window misbehavior is reviewed and com...

Journal: :Clinical pediatrics 1973
L E Arnold

The psychologic aspects of the prescribing, giving, and taking of medicines are especially important when trying to modify the emotion-laden behavior of hyperkinetic children. The physician should start by cultivating positive expectations in child, parents, and teacher. This is necessary in order to break up existing complex vicious cycles of negative expectations, low self-esteem, discouragem...

Journal: :Wireless Communications and Mobile Computing 2010
Ioannis G. Askoxylakis Boldizsár Bencsáth Levente Buttyán László Dóra Vasilios A. Siris D. Szili István Vajda

Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS-aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security requirements of such networks and we give an overview on the available design options for a securi...

Journal: :CoRR 2011
V. Manjula C. Chellappan

Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can reprogram it and replicate the node in order to eavesdrop the transmitte...

Journal: :IACR Cryptology ePrint Archive 2016
Stephanos Matsumoto Raphael M. Reischuk

Man-in-the-middle attacks in TLS due to compromised CAs have been mitigated by log-based PKI enhancements such as Certificate Transparency. However, these log-based schemes do not offer sufficient incentives to logs and monitors, and do not offer any actions that domains can take in response to CA misbehavior. We propose IKP, a blockchain-based PKI enhancement that offers automatic responses to...

Journal: :Ad Hoc Networks 2009
Jinyuan Sun Yuguang Fang

Vehicular ad hoc network (VANET) can offer various services and benefits to VANET users and thus deserves deployment effort. Misusing such network could cause destructive consequences. It is therefore necessary to discourage misbehavior and defend VANET systems against it, in order to ensure correct and smooth operations of the network. In this paper, we review the techniques for handling misbe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید