نتایج جستجو برای: wormhole attack

تعداد نتایج: 82627  

Journal: :International Journal of Computer Applications 2015

Journal: :International journal of Computer Networks & Communications 2014

2014
G. T. Raju William R. Claycomb Dongwan Shin Elaine Shi Dawn Song Yih-Chun Hu Zhibin Zhao Bo Wei Xiaomei Dong Lan Yao Fuxiang Gao Liping Teng Yongping Zhang Changlong Chen

Wireless sensor network is a field which is spreading its wings into different application areas. Security is the primary concern as these nodes are deployed in unattended and harsh environment. Authentication and integrity of data becomes essential to monitor the network installed in remote areas. This paper generates group keys for every session to encrypt data. The technique minimizes 5.5% o...

Journal: :International Journal of Computer Applications 2013

Journal: :Wireless Personal Communications 2021

Many errors in data communication cause security attacks Internet of Things (IoT). Routing at network layer are prominent IoT which degrade the quality communication. like sinkhole attack, blackhole selective forwarding attack and wormhole enter through IoT. This paper has an emphasis on detection a because it is one most uncompromising protocol stack. The disruptive out all other mentioned abo...

2015
Gurjot Singh

Vehicular Ad-Hoc Network is a sub class of MANETs (Mobile Ad-Hoc Networks). It`s a technology that provide secure driving environment by wireless communication between the vehicles. The technique of self-driving vehicle is more significant in today`s world. VANET converts each participating vehicle into wireless sensor nodes that allow vehicles to communicate among themselves. It creates a netw...

2017
Harsh Pratap Singh Rashmi Singh Abderrahmane Baadache Ali Belmehdi Nital Mistry Devesh C. Jinwala Mukesh Zaveri Payal N. Raj Prashant B. Swadas

Mobile ad hoc network (MANETs) is an infrastructureless/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block ...

Journal: :International Journal of Computer Applications 2015

Journal: :International Journal of Engineering & Technology 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید