نتایج جستجو برای: routing misbehavior

تعداد نتایج: 54648  

2015

Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment.. In this paper, we propose ant colo...

2004
Jean-Yves Le Boudec

The successful operation of a mobile ad hoc network depends on cooperation of the nodes in providing services to each other. Nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR) [13]. The network is vulnerable due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability [1], [...

Journal: :TELKOMNIKA (Telecommunication Computing Electronics and Control) 2015

2008
Karthik Iyer

IYER, VARAGUR K. Misbehavior Resistant Fair Scheduling in Wireless Backhaul Mesh Networks. (Under the direction of Dr. Peng Ning). Wireless Mesh Networks (WMNs) are increasingly becoming popular as a means to realizing cost-effective and efficient public area networks. WMNs provide improved coverage with relatively cheaper infrastructure and are easy to deploy and expand as compared to Wireless...

2012
Parita Jain Puneet Kumar Aggarwal B. Wu J. Chen J. Wu Mohammad AL-Shurman Hongmei Deng Wei Li Dharma P. Agrawal Sonja Buchegger Jean-Yves Le Boudec Bo Sun Yong

Mobile Adhoc networks are prone to number of security threats due to unavailability of centralized authority. It incorporates various malicious activities within the network. This research focuses on single Blackhole attack but our design principles may be applicable to wide range of attacks. So, this proposed approach of Blackhole comprises of active routing misbehavior and forwarding misbehav...

2014
Saman Hameed Amin

The seminar presents different approaches to address routing and security of MANETs using swarm technology. The mobility and infrastructure-less of MANET as well as nodes misbehavior compose great challenges to routing and security protocols of such a network. The first approach addresses the problem of channel assignment in multichannel ad hoc networks with limited number of interfaces, where ...

Journal: :International Journal of Computer Applications 2013

2006
S. Balachandran

In wireless ad-hoc networks, the participating wireless stations use a routing protocol called as Dynamic Source Routing (DSR). Such networks are highly vulnerable to (packet) routing misbehavior which is generally due to malware, faulty or compromised stations. For such networks, the traditional way of implementing firewalls at switches, routers or gateways and encryption software are not suff...

2010
Moitreyee Dasgupta S. Choudhury N. Chaki Hoang Lan Nguyen Uyen Trang Nguyen L. Sankaranarayanan Yih-Chun Hu Adrian Perrig David B. Johnson H. Yang H Y. Luo F Ye S W. Lu D. B. Johnson D. A. Maltz C. Shields E. M. Belding-Royer

Rushing attack may cause more vulnerability in MANET as it can be used as a pre-requisite for launching some other types of Denial-of-Service attacks. Significant research efforts have been made towards increasing the survivability of MANET either by developing secure routing algorithms or by improving the robustness of MAC layer protocol in the presence of selfish or compromised nodes. Malicio...

2014
B. Sivakumar J. Sandhiya

Delay Tolerant Network(DTNs) are a class of unique network characterized like lack of guaranteed connectivity ,typically low frequency between DTN nodes and long propagation delay within the networks. Existing routing algorithms for DTN assumes that nodes are willing to forward packets for others but in real word selfish and malicious behaviors occurs while forward packets for nodes. Due to uni...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید