نتایج جستجو برای: malicious nodes
تعداد نتایج: 141332 فیلتر نتایج به سال:
In mobile ad hoc networks, nodes have the inherent ability to move. Aside from conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, malicious nodes get better payoffs with the ability to move. In this paper, we propose a game theoretic framework to analyze the strategy profiles for regular and malicious nodes. We model the situation as a dynamic Bayes...
Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard devices central administration. The network is wireless and can communicate with each other. First foremost, a reliable effective intrusion detection system (NIDS) must be installed maintained. A system's data should protected against ac...
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To address this issue, we propose a secure protocol which consists of two phases: detecting malicious nodes and bypassing them. We present a novel efficient routing strategy called tracer routing to control routing progr...
Mobile ad hoc networks (MANETs) are a collection of mobile nodes that communicates over wireless media. Performance of MANET depends on the cooperative participation of nodes in packet forwarding. During packet forwarding from source to destination, it takes help of middle hop depending on the distance. Middle hops play different role in different times. Nodes in MANETs suffer from limited reso...
Mobile Ad-hoc networks (MANETs) are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. This makes the network susceptible to Byzantyne faults with packets getting misrouted or dropped. This paper proposes solutions using an unobtrusive monitoring technique to locate malicious or faulty nodes that misroute or drop packets. This techniq...
Malicious nodes in wireless sensor network cause serious effects on critical factors like network lifetime, energy consumption and congestion control causing delay in delivery of messages. A lot of methods are being used to detect malicious nodes. In this paper we try to overcome the limitations of existing Watchdog method. For this we propose the method of detection of malicious nodes using se...
In Wireless Sensor Networks (WSNs) the existence of malicious nodes is a serious challenge. Malicious nodes increase the traffic by sending distrusted messages. In this paper, we present CCTF: a congestion control protocol based on trustworthiness of nodes in WSNs using fuzzy logic. Through the use of CCTF, each node reduces malfunctioning neighbour(s) effects via dropping valueless packets and...
In a m obile ad-hoc network, nodes cannot rely on a ny fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. H owever, performing network functions consumes energy and other resources. Therefore, some network nodes may decide against cooperating with others; selfish nodes. Also security issues are more paramount in such networks even more so than i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید