نتایج جستجو برای: routing misbehavior
تعداد نتایج: 54648 فیلتر نتایج به سال:
This paper deals with security of routing protocols of Mobile Ad hoc Networks (MANETs), and proposes a solution to immunize such protocols against packet dropping misbehavior. Most of the current secure protocols are vulnerable to packet dropping misbehavior, which can be exploited by selfish nodes and malicious ones as well. For example, simply by dropping RREQ (Route Request) packets a selfis...
The major challenge to design and deployment of mobile ad hoc networks (MANETs) is its dynamic nature, which carries with itself a set of security measures to be resolved. In this paper, we compare the behavior of three routing protocols DSDV, DSR and AODV under security attack, where the investigation is carried out with respect to two types of node misbehavior. The parameters taken into consi...
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior unattractive; it is based on selective altruism and utilitarianism. It aims at detecting and isolating misbehaving nodes, thus making it unattractive to ...
We provide a comparative analysis of various routing strategies that affect the end-to-end performance in wireless mesh networks. We first improve well-known link quality metrics and routing algorithms to enhance performance in wireless mesh environments. We then investigate the route optimality, i.e., whether the best end-to-end route with respect to a given link quality metric is established,...
Misbehavior by rats, in the form of unnecessary and species-typical pawing, nosing, carrying, chewing, and retrieving a rolling ball bearing, was produced by pairing the ball bearing with food (Pavlovian procedure, Experiments 1 and 2) or by requiring contact with the ball bearing for food (operant procedure, Experiments 4 and 5). Misbehavior occurred both before and after eating the food pelle...
Efforts to advance research integrity in light of concerns about misbehavior in research rely heavily on education in the responsible conduct of research (RCR). However, there is limited evidence for the effectiveness of RCR instruction as a remedy. Assessment is essential in RCR education if the research community wishes to expend the effort of instructors, students, and trainees wisely. This ...
Wireless sensor networks have gained remarkable appreciation over the last few years. Despite significant advantages and tremendous applications, WSN is vulnerable to variety of attacks. Due to resource constraint nature of WSN, applicability of traditional security solutions is debatable. Although cryptography, authentication and confidentiality measures help in preventing specific types of at...
Within the domain of wireless computer networks, this thesis examines the security issues related to protection of packet routing in ad hoc networks (MANETs). This thesis classifies the different possible attacks and examines in detail the case of OLSR (Optimized Link State Routing protocol). We propose a security architecture based on adding a digital signature, as well as more advanced techni...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید