نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

Journal: :Transactions on Emerging Telecommunications Technologies 2022

Flying Ad Hoc Networks (FANETs) are gaining popularity due to its extra-ordinary features in avionics and electronics domain. FANETs also considered as most powerful weapon military assets well civil security applications. Due infrastructureless design wireless nature network, some challenges overhead that should be overcome before the whole network performance degradation. Malicious nodes capa...

2014
Preeti Nagrath Sandhya Aneja G. N. Purohit

Delay Tolerant Network (DTN) routing protocols works in an environment where there is no guarantee of end to end path between source and destination. DTNs operate with the principle of store, carry and forward. Mobile nodes have limited buffer space and contact opportunity. So the resources are useful and must be used optimally. The routing protocol message replication strategies react differen...

Journal: :IJITN 2009
Floriano De Rango

Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this wor...

Journal: :IJICS 2009
Hongbing Hu Yu Chen Wei-Shinn Ku Zhou Su Chung-Han Chen

Deployed in a hostile environment, the individual Sensor Node (SN) of a Wireless Sensor Network (WSN) could be easily compromised by an adversary due to constraints such as limited memory space and computing capability. Therefore, it is critical to detect and isolate compromised nodes in order to avoid being misled by the falsified information injected by adversaries through compromised nodes. ...

2013
Jasleen Arora Paramjeet Singh Shaveta Rani

MANET network is a type of decentralized network and is high vulnerable network which requires secure communication.A significant security issue in manet is to protect the network layer from malicious nodes that misbhaves often to obtain the data that is not broadcasted for them i.e gray hole attacks aka selective forwarding attack that leads to denial of service attack(DoS) .In this paper The ...

2008
Micah Sherr Boon Thau Loo Matt Blaze

Decentralized logical coordinate systems have been proposed as a means of estimating network distances. These systems have widespread usage in p2p networks, ranging from neighbor selection to replica placement. Unfortunately, these systems are vulnerable to even a small number of malicious nodes lying about their coordinates or measurements. In this paper, we introduce Veracity, a fully decentr...

2012
S. Lakshmi S. Radha

The projected work be composed of mechanisms for distinguish the selfish node as well as an attitude called rehabilitate-before-malicious behavior for justifying against the malicious behavior of nodes having self-centeredness. The parameter namely the packet weighted energy drain rate provides a direct solution for sorting out the selfish nodes. If packet weighted energy drain rate selfish sch...

2014
Deepak Chavan

MANET is a infrastructure less network with dynamically changing topologies and random communicating node. Here the mobile nodes communicate directly to other nodes without any router and hence the desired functionalities are embedded to each node. As the network is made of mobile nodes with less hardware configurations and requirements than a router, thus routing and its protocols used here is...

2004
Antonio Nicolosi David Mazières

We propose a new cryptographic technique, Acknowledgment Compression, permitting senders of multicast data to verify that all interested parties have either received the data or lost network connectivity. Joining the system and acknowledging messages both require bandwidth and computation logarithmic in the size of a multicast group. Thus, the technique is well-suited to large-scale, peer-topee...

Journal: :Computer Networks 2011
Boris Nechaev Dmitry G. Korzun Andrei V. Gurtov

Distributed Hash Tables (DHTs) provide a useful key-to-value lookup service for many Internet applications. However, without additional mechanisms DHTs are vulnerable to attacks. In particular, previous research showed that Chord is not well resistant to malicious nodes that joined the DHT. We introduce the cyclic routing algorithm as an extension of Chord (CR-Chord). Using simulations we compa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید