نتایج جستجو برای: misbehavior
تعداد نتایج: 965 فیلتر نتایج به سال:
A Mobile Ad hoc Network (MANET) works on the assumption that mobile nodes are cooperative. On the other hand, in practical, it may not be possible due to selfish, malicious and misbehaving nodes present in the network. These nodes are capable of interrupting the communication process and there is a potential for serious performance degradation. To improve the performance of the network, detecti...
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow the selective deanonymization (or linking) of misbehaving users upon a complaint to a trusted third party (TTP). The ability of the TTP to revoke a user’s privacy at any time, however, is too strong a punishment for m...
Noncooperation or failure to work together is a big challenge that surely degrades the performance and reliability of Mobile Adhoc Networks. In MANETs, nodes have dual responsibilities of forwarding and routing, that‟s why it needs unison with nodes. To sort out non-cooperation a real life behavior should be implemented, so that misbehavior is nullified. In this paper, we present the “Mirror Mo...
Parents are often told that better monitoring can prevent adolescents’ misbehavior. However, recent research suggests that adolescents’ voluntary self-disclosure of behaviors is more important than parents’ active attempts to supervise (i.e., track and control) their children in determining adolescent misbehavior. This secondary analysis of a survey administered to students in grades 7, 9, and ...
A theoretical model is described which conceptualizes school crime and disruption as a function of the congruence or fit between the personal characteristics of students and the social environments of the schools they attend. In a direct empirical test of the model, indices representing 10 distinct dimensions of student-school fit are related to three composite measures of school misconduct: sc...
In vehicular networks, many vehicles participate in the network and transfer messages for each other. At least for the next years, i.e., until a high rate of vehicles equipped with according network technology has been reached, we believe that delay-tolerant methods are useful in such networks, leading to Vehicular Delay Tolerant Networks. However, in such a cooperative system malicious or self...
In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium and have nodes monitor their neighborhood. We call such nodes the Watchdogs. We propose a lightweight misbehavior detection scheme which integrates the idea of watchdogs and error detection coding. We show that even if the watc...
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly. A new intrusion detection system named Enhanced Adaptive Acknowledgement (EAACK) s...
A PTP approach in network security for misbehavior detection system is a method of detecting malicious misbehavior activity within networks. The System detects the malicious node and blocks them by adding into Blacklist. Malicious nodes are the compromised machine present in the network, which performs the task given by bot server i.e. it does not forward the legitimate message to another node ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید