نتایج جستجو برای: malicious nodes

تعداد نتایج: 141332  

2009
Deepak Kumar Sharma S. K. Saxena Ajay Kaushik Vijay Tiwari

We present an intrusion detection mechanism that uses collaborative efforts of the nodes in a neighborhood to detect aberrant behavior in a mobile ad hoc network. A node showing this kind of behavior is termed as a malicious node. The technique is designed for detection of malicious nodes in a neighborhood in which each pair of nodes are within radio range of each other. Such a neighborhood of ...

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

2017
Kavin Kumar

The mobile ad-hoc networks (MANET) are temporary wireless networks. Emergency and rescue operations are supported with MANET environment. Data values in a mobile node can be shared with all the nodes in the network. The query values are issued for the shared data access. The intermediate nodes retransmit the query and its response values to other nodes. Different routing schemes can be adapted ...

2006
Martin Schütte

Mobile ad-hoc networks (MANETs) rely on cooperation of all participating nodes. Thus they are vulnerable to selfish nodes using the net without providing own ressources, as well as malicious nodes attacking the net infrastructure. This paper outlines important attacks and summarizes popular approaches to design secure MANET protocols in order to detect selfish and malicious nodes and to enforce...

2016
R. Gopal V. Parthasarathy Rakesh Kumar S. Hemalatha

Wireless sensor network is the most commonly used means of wireless communication. Malicious activities in wireless sensor network will degrade its performance. Such as, by decreasing the energy consumption and increasing the bandwidth the overall network performance will decrease. Researchers are focusing on the prevention of malicious nodes and malicious activities in the earlier stages for e...

Journal: :Indian Journal of Science and Technology 2015

Journal: :The SIJ Transactions on Computer Networks & Communication Engineering 2017

2017
Amol R. Dhakne Prashant N. Chatur

In wireless sensor network, traditional security mechanisms such as cryptographic methods need a large consumption of resources such as memory, speed, and communication bandwidth. And by using such techniques it is not possible to detect malicious, faulty and selfish nodes that harm to network. Alternatively, trust methods calculate trust of sensor nodes and thereby help to detect malicious, se...

2010
MA Xin-Xin ZHAO Yang QIN Zhi-Guang

In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use of the search approach launching distributed denial of service (DDoS) attack which aims at the whole network. In order to alleviate or minimize the bad effect due to behavior of mali...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید