نتایج جستجو برای: wireless mobile ad
تعداد نتایج: 327865 فیلتر نتایج به سال:
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
Mobile ad hoc network congestion control is a significant problem. Standard mechanism for congestion control (TCP), the ability to run certain features of a wireless network, several mutations are not common. In particular, the enormous changes in the network topology and the joint nature of the wireless network. It also creates significant challenges in mobile ad hoc networks (MANET), density ...
Recent advancements in wireless communication technologies have attracted ad-hoc networking, which enables mobile users to communicate with each other without any infrastructure. While many ad-hoc routing protocols have been proposed, ad-hoc communication and its applications are not widespread. To expedite the widespread use of ad-hoc communications, we turn our attention to the handiest wirel...
In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...
mobile ad hoc networks (manets) are composed of mobile stations communicating through wireless links, without any fixed backbone support. in these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. tora is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it doesn’...
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little ...
In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Ad hoc networks are a new wireless network for mobile hosts. Owe to the vulnerable nature of the mobile ad hoc network, there are many security threats that effected the development of wireless network. We evaluate the accessible in the mobile ad hoc networks and find out attacks than the convent...
Security is a major concern in wireless technology and this work deals with security in wireless mobile ad-hoc network by using Novel IDS in Open Shortest Path First (OSPF) routing protocol. We are bounding wireless mobile ad-hoc network nodes to getting updates from unknown or unwanted nodes on the same network through routing table; we are using a Novel intrusion detection technique with the ...
mobile ad hoc networks (manet) are constructed by mobile nodes without access point. since manet has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. the olsr protocol is an optimization of the classical link state algorithm. olsr introduces an interesting concept, the multipoint r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید