نتایج جستجو برای: wormhole attack

تعداد نتایج: 82627  

2017
Harsh Pratap Singh Rashmi Singh

Mobile ad hoc network (MANETs) is an infrastructure-less/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block...

2016
Anuradha Jayakody Rohan Samarasinghe Saluka R. Kodituwakku

In nature of the transmission medium the broadcast, Wireless sensor networks are vulnerable to security attacks. The nodes are placed in a hostile or dangerous environment where they are not tangibly safe in the MANETs. In many application, the data obtained from the sensing nodes need a false, or malicious node could intercept private information or could send false messages to nodes in the ne...

Journal: :International Journal of Computer Science, Engineering and Applications 2012

Journal: :International Journal of Research in Engineering and Technology 2014

Journal: :International Journal of Smart Sensor and Adhoc Network. 2012

Journal: :International Journal of Computer Applications 2015

2017
Jonny Karlsson

The Internet is experiencing an evolution towards a ubiquitous network paradigm, via the so-called internet-of-things (IoT), where small wireless computing devices like sensors and actuators are integrated into daily activities. Simultaneously, infrastructure-less systems such as mobile ad hoc networks (MANET) are gaining popularity since they provide the possibility for devices in wireless sen...

Journal: :IJDSN 2013
Dong-uk Kim Hyo-Won Kim Gisung Kim Sehun Kim

In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید