نتایج جستجو برای: routing misbehavior
تعداد نتایج: 54648 فیلتر نتایج به سال:
Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment.. In this paper, we propose ant colo...
The successful operation of a mobile ad hoc network depends on cooperation of the nodes in providing services to each other. Nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR) [13]. The network is vulnerable due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability [1], [...
IYER, VARAGUR K. Misbehavior Resistant Fair Scheduling in Wireless Backhaul Mesh Networks. (Under the direction of Dr. Peng Ning). Wireless Mesh Networks (WMNs) are increasingly becoming popular as a means to realizing cost-effective and efficient public area networks. WMNs provide improved coverage with relatively cheaper infrastructure and are easy to deploy and expand as compared to Wireless...
Mobile Adhoc networks are prone to number of security threats due to unavailability of centralized authority. It incorporates various malicious activities within the network. This research focuses on single Blackhole attack but our design principles may be applicable to wide range of attacks. So, this proposed approach of Blackhole comprises of active routing misbehavior and forwarding misbehav...
The seminar presents different approaches to address routing and security of MANETs using swarm technology. The mobility and infrastructure-less of MANET as well as nodes misbehavior compose great challenges to routing and security protocols of such a network. The first approach addresses the problem of channel assignment in multichannel ad hoc networks with limited number of interfaces, where ...
In wireless ad-hoc networks, the participating wireless stations use a routing protocol called as Dynamic Source Routing (DSR). Such networks are highly vulnerable to (packet) routing misbehavior which is generally due to malware, faulty or compromised stations. For such networks, the traditional way of implementing firewalls at switches, routers or gateways and encryption software are not suff...
Rushing attack may cause more vulnerability in MANET as it can be used as a pre-requisite for launching some other types of Denial-of-Service attacks. Significant research efforts have been made towards increasing the survivability of MANET either by developing secure routing algorithms or by improving the robustness of MAC layer protocol in the presence of selfish or compromised nodes. Malicio...
Delay Tolerant Network(DTNs) are a class of unique network characterized like lack of guaranteed connectivity ,typically low frequency between DTN nodes and long propagation delay within the networks. Existing routing algorithms for DTN assumes that nodes are willing to forward packets for others but in real word selfish and malicious behaviors occurs while forward packets for nodes. Due to uni...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید