نتایج جستجو برای: routing misbehavior

تعداد نتایج: 54648  

2014
Farruh Ishmanov Sung Won Kim Seung Yeob Nam

Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against o...

2009
MinJi Kim Muriel Médard João Barros Ralf Kötter

In this paper, we propose a scheme, called the algebraic watchdog for wireless network coding, in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages, and, thus, provide a secure global self-checking network. Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders an a...

2003
L. Kalyan Kumar Amol Mupid Aditya S. Ramani V. Kamakoti

This paper describes a novel method for online detection and location of interconnects faults in SRAM-based FPGA systems. In safety critical systems like space probes, online checkers are used to report misbehavior of any of the subcircuit within the system. When one such subcircuit is reported to misbehave, the algorithm proposed in this paper attempts to detect and locate the interconnect fau...

2012
S. Gopinath

Mobile Ad Hoc Networks are the set of mobile hosts operating without the aid of the established infrastructure of centralized administration. Due to lack of infrastructure, the network can be easily affected by several attacks. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is t...

2006
Jyoti Prakash Singh Paramartha Dutta

A wireless sensor network is a collaborative network in which nodes perform their sensing task in one hand, and function as relay for transferring the data of other nodes on the other hand if necessary. It consists of many inexpensive wireless nodes, each having sensing capability with some computational and communication power. As sensor networks are coming to be of wide-spread deployment, sec...

Journal: :IJAPUC 2014
S. A. Akinboro Emmanuel Ajayi Olajubu Ibrahim Kazeem Ogundoyin Ganiyu Ajayi Aderounmu

This article developed a framework for trust management in mobile ambient home network with a view to secure the home devices and channel against attacks. The framework was design using mobile ad hoc network and social networking concept. The trust management, global reputation aggregation which considered the direct and indirect communication of home devices and remote devices was employed to ...

2012
Renu Dalal Manju Khari

MANET (Mobile Ad-hoc Network) is hot spot for research due to its various advantages and disadvantages. Providing safe communication between mobile nodes, recognization the position of nodes, reducing overhead, handling misbehavior and location updates are such a difficult issues in ad-hoc network, so providing trust schemes is an important in this network. MANET provides some basic functions l...

2012
K. Kiruthika Devi M. Ravichandran

Wireless Ad hoc networks present more security problems than the conventional wired and wireless networks because of the nature of dynamically changing and a fully decentralized topology. As the Ad hoc network lacks infrastructure the nodes have to cooperate for services like routing and data forwarding. This paper proposes a Autonomous Intrusion Detection System using SVM. The feature set are ...

2004
James Newsome Elaine Shi Dawn Xiaodong Song Adrian Perrig

Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important f...

2006
Debapriyay Mukhopadhyay Indranil Saha

Security is a major concern for a large fraction of sensor network applications. Douceur first introduced the notion of sybil attack [4], where a single entity(node) illegitimately presents multiple identities. As the nodes in sensor networks can be physically captured by an adversary, sybil attack can manifest in a severe form leading to the malfunction of basic operational protocols including...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید