نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

Journal: :International Journal of Applied Mathematics, Electronics and Computers 2015

2013
Miss Morli Pandya Ashish Kr. Shrivastava

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure, Instead, hosts rely on each other to keep the network connected. One main challenge in the design of these networks is their vulnerability to security attacks. In this Survey, we study the threats an ad hoc network faces a...

Journal: :journal of advances in computer research 2014
iman zangeneh sedigheh navaezadeh abolfazl jafari

wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. the connection between nodes is provided by sending packages and by trusting to each other. therefore, using efficient and certain protocols is the essential requirement of these networks. due to special characteristics of wireless ad hoc networks such as lack of a fixed infrastructure, t...

2014
Harminder Singh Bindra A L Sangal

Nodes in the DTN work on the foundation of cooperation in the network. When working in a cooperative manner, these nodes consume some network resources like bandwidth, buffer space etc. Like any other networks, DTNs are also prone to the malicious nodes and different attacks. In this work, we have proposed an attack model comprising of falsification of extended routing protocol metadata informa...

2011
Elmar Gerhards-Padilla Nils Aschenbruck Peter Martini

The usage of link quality based routing metrics significantly improves the quality of the chosen paths and by that the performance of the network. But, attackers may try to exploit link qualities for their purposes. Especially in tactical multi-hop networks, routing may fall prey to an attacker. Such routing attacks are a serious threat to communication. TOGBAD is a centralised approach, using ...

Journal: :JCM 2008
Yihui Zhang Li Xu Xiaoding Wang

In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nodes could greatly degrade the network performance and might even result in a total communication breakdown. However, the majority of ad hoc networks secure routing protocols assumed that all nodes participating in the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید