نتایج جستجو برای: wormhole attack
تعداد نتایج: 82627 فیلتر نتایج به سال:
Wireless sensor network is an area where there has been alot of significant developments. These sensors are hugely utilized in many applications like military applications, home automation, and environment surveillance. An application where confidential data is being transmitted requires to be protected from different types of attacks. Though the nodes are authenticated, they are liable to get ...
in this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (aodv) routing protocol is proposed. in the method, the required features for describing the normal behavior of aodv are defined via step by step analysis of aodv and independent of any attack. in order to learn the normal behavior of aodv, a fuzzy averaging method is used fo...
Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructureless network with dynamic topology pose a number of challenges to security design and makes it vulnerable for different types of security attacks. In wormhole attack a pair of colluding nodes makes a tunnel using a high speed network. These colluding nodes create an illusi...
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
In recent years, ubiquitous computing using Mobile Ad Hoc Networks (MANET) created many researches in all the application areas. Since the nodes in MANET are small with limited resources, highly mobile and has no centralized administrative control, it is used for tracking and monitoring in unattended environments. Dynamic topological changes due to the high mobility of the nodes make challenges...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید