• Nenhum resultado encontrado

[PDF] Top 20 Guard against cooperative black hole attack in Mobile Ad-Hoc Network

Has 10000 "Guard against cooperative black hole attack in Mobile Ad-Hoc Network" found on our website. Below are the top 20 most common "Guard against cooperative black hole attack in Mobile Ad-Hoc Network".

Guard against cooperative black hole attack in Mobile Ad-Hoc Network

Guard against cooperative black hole attack in Mobile Ad-Hoc Network

... A mobile ad-hoc network is an autonomous network that consists of nodes which communicate with each other with wireless ...nodes, mobile ad hoc networks are more ... See full document

6

A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET

A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET

... Mobile ad-hoc networks are prone to various security vulnerabilities because of its characteristics mainly high mobility of nodes, and no well defined ...on Mobile ad-hoc ... See full document

6

Impact of Black Hole and Neighbor Attack on AOMDV Routing Protocol

Impact of Black Hole and Neighbor Attack on AOMDV Routing Protocol

... A Mobile Ad hoc Networks (MANETs) is defined as a wireless network of mobile nodes communicating with each other in a multi-hop fashion without the support of any fixed ... See full document

10

An Assessment of Worm Hole attack over Mobile Ad-Hoc Network as serious threats

An Assessment of Worm Hole attack over Mobile Ad-Hoc Network as serious threats

... each mobile nodes antennas to defend against wormholes and maintain an directional scheme ie sender node sends packets in a given direction and receiver packet will get that packet from the opposite ... See full document

9

Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks

Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks

... In this paper we present a mechanism capable of detecting and removing the malicious nodes launching these two types of attacks. Our approach consists of an algorithm which works as follows. Instead of sending the ... See full document

6

A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

... a black-hole attack, a malicious node impersonates a destination node by sending a spoofed route reply packet to a source node that initiates a route discovery thereby creating a threat to the ... See full document

13

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

... gray hole attack on MANETs. The gray hole attack has two ...stages. In the first stage, a attacker exploits the AODV protocol to advertise itself as having a valid route to a ... See full document

20

Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks

Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks

... The Ad hoc On Demand Distance Vector (AODV) routing algorithm is a routing protocol designed for ad hoc mobile networks [6] ...of mobile nodes ...node in the route tables. ... See full document

9

Secure Routing and Data Transmission in Mobile Ad Hoc Networks

Secure Routing and Data Transmission in Mobile Ad Hoc Networks

... communication in areas where setting up fixed infrastructures is not a suitable option constraints such as geographical location, financial implications, etc; (c) it can be set up in emergency situations ... See full document

17

Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks

Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks

... However, in mobile network, the convergence of virtual ants to one best route, could not be a desir- able ...situation. In mobile networks, the bandwidth is scarce and an overload of ... See full document

7

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

... efficiency in the fuzzy-based ...clustering. In FCM, each data point belongs to a cluster to degree specified by a membership ...center in each group such that the dissimilarity is minimized. ... See full document

5

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

... processing in mobile databases has been presented in (Saha and Chowdhury, ...the mobile database server for broadcasting through a channel of larger ...The mobile devices can retrieve ... See full document

6

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

... Aware Ad hoc On- demand Multipath routing Protocol (LSEA) is proposed, which adapts a delay function, link quality and battery remaining ...ratio, network lifetime and side effects of time delayed ... See full document

5

COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

... destinations in the network. The information available in neighbours and topology tables are the base of routing table in OLSR, each node re-calculates its routing table if any changes occur ... See full document

19

A Smart Booster Approach In Wireless Ad Hoc Network

A Smart Booster Approach In Wireless Ad Hoc Network

... Wireless Mobile Ad-hoc network is upcoming next generation ...wireless mobile nodes which are connected wirelessly. Nodes may be highly mobile because the beauty of wireless ... See full document

5

COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

... nodes in the ...node in the communication path maintains a sequence number which also act as a ...participates in the ...path in the networks. 2.1. Black Hole Attack ... See full document

15

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

... Routing in MANET using the shortest hop count is not a sufficient condition to construct high-quality routes, because minimum hop count routing often chooses routes that have significantly less capacity than the ... See full document

6

Parameterized Verification of Safety Properties in Ad Hoc Network Protocols

Parameterized Verification of Safety Properties in Ad Hoc Network Protocols

... reasons, in [4] we have decided to investigate classes of graphs that at least include the clique ...networks in which the underlying topology is in between the class of cliques and the strictly ... See full document

10

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

... stored in a routing table and is exchanged among all neighbors using a status flag with RREQ ...are in the routing table, whenever the source node sends data to the ...Strength in the protocol can be ... See full document

6

EXTENDED DYNAMIC SOURCE ROUTING PROTOCOL FOR AD HOC NETWORK

EXTENDED DYNAMIC SOURCE ROUTING PROTOCOL FOR AD HOC NETWORK

... self-configurable mobile nodes. Several routing protocols are proposed for ad hoc network among which DSR and AODV On demand routing protocols are mostly ...large network because packet ... See full document

3

Show all 10000 documents...