نتایج جستجو برای: malicious nodes
تعداد نتایج: 141332 فیلتر نتایج به سال:
In mobile ad hoc networks (MANETs), nodes can move freely. Besides conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, malicious nodes get better payoffs with the ability to move. In this paper, we propose a game theoretic framework to analyze the strategy profiles for regular and malicious nodes. We model the situation as a dynamic Bayesian signalin...
Identification and isolation of malicious nodes in a distributed system is a challenging problem. This problem is further aggravated in a wireless network because the unreliable channel hides the actions of each node from one another. Therefore, a regular node can only construct a belief about a malicious node through monitoring and observation. In this paper, we use game theory to study the in...
Mobile nodes of various routing protocols in Mobile Ad hoc Networks follow different strategies in transmission and receiving of data. Security, packet delivery and routing overhead are important concerns for any protocol during designing them. The presence and absence of malicious nodes in the network affect a lot on the performance of the protocol. This research is mainly focused on the study...
MANET stands for Mobile Ad Hoc Network. The Ad Hoc network that is used for mobile communication is called MANET. The MANETS are used when the user is moving. Because MANET does not depends on fixed infrastructure. Wireless networks are used to connect with different networks in MANETs. Security is more critical in wireless communication when compared to the wired communication. So the security...
The performance and nodes behaviour in the wireless sensor networks are affected by malicious nodes. These malicious nodes alter and degrade the network performance. In this paper, a hybrid Acknowledge scheme is proposed for the detection of malicious nodes in the wireless sensor networks. The nodes in the wireless sensor network are grouped into number of clusters. Each cluster possesses only ...
Proof: We can prove Proposition 1 by contradiction. Suppose the number of malicious service providers is less than |CG|. Then the graph formed by malicious nodes cannot cover the entire graph, which means there exists one edge that is not incident to any of the malicious nodes. Thus, the edge must be incident to two benign nodes. Since two benign nodes always agree with each other, this contrad...
Inherent resource limitation nature of wireless sensor networks poses unique security challenges. Cryptography is not enough and efficient to secure wireless sensor networks; it can not prevent malicious nodes and tunneling of messages to wormholes and sinkholes. In this paper we propose a monitoring mechanism to detect malicious nodes; the proposed mechanism is protected with a secure triple k...
Corresponding Author: T.R. Vedhavathy Department of CSE, KLN College of Engineering, Sivagangai, India Email: [email protected] Abstract: Wireless ad hoc networks are used in emergency situations especially for surveillance and monitoring. The nodes in the ad hoc networks are self-organized and can accommodate by themselves with the available resources. The nodes are capable of random movement a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید