نتایج جستجو برای: wormhole attack
تعداد نتایج: 82627 فیلتر نتایج به سال:
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. ...
Wireless ad hoc networks are envisioned to be randomly deployed in versatile and potentially hostile environments. Hence, providing secure and uninterrupted communication between the un-tethered network nodes becomes a critical problem. In this paper, we investigate the wormhole attack in wireless ad hoc networks, an attack that can disrupt vital network functions such as routing. In the wormho...
In mobile ad hoc networks (MANETs) security is of major concern because of its inherent liabilities. The characteristics of MANETs like infrastructure less network with dynamic topology pose a number of challenges to security design. There is an increasing threat of attacks in MANET. Wormhole attack is one of the security attacks on mobile ad hoc networks in which a pair of colluding nodes make...
The mobile adhoc networks, is the decentralized type of network in which mobile nodes can join or leave the network when they want. The secure and shortest path from source to destination will be selected on the basis of hop count and sequence number. The selected path must have minimum hop count and maximum sequence number. When the malicious node enters the network it leads to trigger wormhol...
The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. However, almost all common routing protocols at present consider performance as first priority, and have little defense capability against the malicious nodes. Many researches have proposed various protocols of high...
The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all rescue teams. We use the term emergency MANETs (eMANETs) in order to describe Next Generation Networks (NGNs) which are deployed in emergency cases such as forest fires and terrorist attacks. Secure routing in MANETs is critical. Due to the absence of a central authori...
Wireless sensor networks consist of many tiny sensors with sensing and communication ability. The applications of wireless sensor networks are widely used today in battlefield guard, circumstance monitor, and traffic analysis. Sensor network often carries on mission-critical tasks. Thus, security in sensor network is vital. Wormhole attack may threat the availability of networks by dropping dat...
A Mobile Ad hoc Network (MANET) is a collection of selfconfiguring nodes which uses the wireless link between communicating devices (mobile devices) to form an arbitrary topology without infrastructure. Dynamic topological changes caused by high node mobility make routing and securing communication challenging. Thus, the MANET is vulnerable to attacks due to their dynamic, lack of both distribu...
MANET is a collection of mobile hosts with wireless network interfaces that form a temporary network without any fixed infrastructure or centralized administration. MANET is infrastructure-less, lack of centralized monitoring and dynamic changing network topology. MANET is highly vulnerable to attack due to open error prone shared wireless medium. In this paper, we proposed an algorithm for avo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید