نتایج جستجو برای: misbehavior

تعداد نتایج: 965  

2014
J C Kavitha

MANETs are based on wireless multi-hop communication. To ensure correct operation, nodes need to cooperate and forward messages from other nodes. However there can be misbehaving nodes that can silently drop packets. Such misbehaviors can be either an individual node misbehavior or misbehavior of nodes in collusion. In this paper, a new approach is proposed to identify and mitigate the packet d...

Journal: :CoRR 2010
R. Kalaiarasi Getsy S. Sara S. Neelavathy Pari D. Sridharan

Mobile Ad Hoc Network (MANET) is a collection of nodes that can be rapidly deployed as a multi-hop network without the aid of any centralized administration. Misbehavior is challenged by bandwidth and energy efficient medium access control and fair share of throughput. Node misbehavior plays an important role in MANET. In this survey, few of the contention window misbehavior is reviewed and com...

2003
Marco Conti Enrico Gregori Gaia Maselli

Ad hoc networking is a new paradigm of wireless communications for mobile nodes. Mobile ad hoc networks work properly only if the partecipating nodes cooperate to network protocols. Cooperative algorithms make the system vulnerable to user misbehavior as well as to malicious and selfish misbehavior. Nodes act selfishly to save battery power, by not cooperating to routing-forwarding functions. L...

Journal: :Clinical pediatrics 1973
L E Arnold

The psychologic aspects of the prescribing, giving, and taking of medicines are especially important when trying to modify the emotion-laden behavior of hyperkinetic children. The physician should start by cultivating positive expectations in child, parents, and teacher. This is necessary in order to break up existing complex vicious cycles of negative expectations, low self-esteem, discouragem...

Journal: :IACR Cryptology ePrint Archive 2016
Stephanos Matsumoto Raphael M. Reischuk

Man-in-the-middle attacks in TLS due to compromised CAs have been mitigated by log-based PKI enhancements such as Certificate Transparency. However, these log-based schemes do not offer sufficient incentives to logs and monitors, and do not offer any actions that domains can take in response to CA misbehavior. We propose IKP, a blockchain-based PKI enhancement that offers automatic responses to...

Journal: :Ad Hoc Networks 2009
Jinyuan Sun Yuguang Fang

Vehicular ad hoc network (VANET) can offer various services and benefits to VANET users and thus deserves deployment effort. Misusing such network could cause destructive consequences. It is therefore necessary to discourage misbehavior and defend VANET systems against it, in order to ensure correct and smooth operations of the network. In this paper, we review the techniques for handling misbe...

2004
Jean-Yves Le Boudec Slavisa Sarafijanovic

In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper we investigate the use of an Artificial Immune System (AIS) to detect ...

2014
Farruh Ishmanov Sung Won Kim Seung Yeob Nam

Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against o...

Journal: :Proceedings of the IEEE 2014

Journal: :Journal of Association of Arab Universities for Tourism and Hospitality 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید