• Nenhum resultado encontrado

[PDF] Top 20 Impact of Black Hole and Neighbor Attack on AOMDV Routing Protocol

Has 10000 "Impact of Black Hole and Neighbor Attack on AOMDV Routing Protocol" found on our website. Below are the top 20 most common "Impact of Black Hole and Neighbor Attack on AOMDV Routing Protocol".

Impact of Black Hole and Neighbor Attack on AOMDV Routing Protocol

Impact of Black Hole and Neighbor Attack on AOMDV Routing Protocol

... objective of the neighbor attack is to disrupt the multipath paths by making two hops that are in fact out of each other's transmission spectrum consider that they can transmit the data ... See full document

10

Prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm

Prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm

... collection of wireless mobile nodes that communicate with each other without use of network ...types of attacks because of the dynamic topology and lack of centralized ... See full document

5

AODV Improvement by Modification at Source Node and  Securing It from Black Hole Attack.

AODV Improvement by Modification at Source Node and Securing It from Black Hole Attack.

... storage and computational resources ,as a result, they are more vulnerable to various communications security related ...focus on analyzing and improving the security of routing ... See full document

6

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

... Use of Fuzzy Inference System (FIS) in the design of IDS is proven to be efficient in detecting routing attacks in ...process of FIS based hybrid IDS. This study describes the design of ... See full document

5

COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

... join and leave the network at any time. Hence any type of intruders can attack the communication at any time, especially the routing mechanism between the ...study and understand two ... See full document

15

A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET

A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET

... because of its characteristics mainly high mobility of nodes, and no well defined ...attacks on Mobile ad-hoc network have been identified so far and Black hole ... See full document

6

Security protection across network based attacks in mesh networks

Security protection across network based attacks in mesh networks

... disruption attack) the main aims to defect the routing scheme which leads to the unavailability of its network ...Examples of DoS attacks at different protocol layers are channel ... See full document

9

A Cooperative Blackhole Node Detection Mechanism for ADHOC Networks

A Cooperative Blackhole Node Detection Mechanism for ADHOC Networks

... Dixon and Kendall Nygard proposed a method for identifying multiple black hole ...group black hole ...AODV protocol by introducing Data Routing Information (DRI) Table ... See full document

5

A Survey of Protocol Classifications and Presenting a New Classification of Routing protocol in ad-hoc

A Survey of Protocol Classifications and Presenting a New Classification of Routing protocol in ad-hoc

... situation of its constituent nodes is varying. The routing protocol must manage the node mobility and transfer the parcel to target accurately so that communication sides is not informed about ... See full document

6

Health And Wellbeing Impact And Treatment of Nocturia – A Review of The Literature

Health And Wellbeing Impact And Treatment of Nocturia – A Review of The Literature

... limitation of most drug trials for LUTS has been the inadequate assessment of nocturia due to a failure to use voiding diaries or to assess the impact of nocturia on sleep and ... See full document

6

On the Support of Multimedia Applications over Wireless Mesh Networks

On the Support of Multimedia Applications over Wireless Mesh Networks

... 5 and 6 illustrate the effect of increasing the number of active QoS stations transmitting data to the access point on the average end-to-end delay values for the three data flows separately ... See full document

17

Dispelling Black Hole Pathologies Through Theory and Observation

Dispelling Black Hole Pathologies Through Theory and Observation

... characteristics of quasars, which have inspired suggestions that their central engines may not abide by topo- logical censorship, with a theoretical understanding of why that might ...in black ... See full document

9

Influence of vibrations during crystallization on mechanical properties and porosity of AlSi13Cu2 alloy

Influence of vibrations during crystallization on mechanical properties and porosity of AlSi13Cu2 alloy

... number of defective products, so called defects shall approach to ...technology of production, introduces improvements which would help in accomplishment of this ...introduction of different ... See full document

4

Effect of water glass modification with nanoparticles of zinc oxide on selected physical and chemical properties of binder and mechanical properties of sand mixture

Effect of water glass modification with nanoparticles of zinc oxide on selected physical and chemical properties of binder and mechanical properties of sand mixture

... wetting of the surface of the quartz grains (Fig. 3). Changes of contact angle in time are characterised by high values of both the initial contact angle θ 0 (about 45 ... See full document

4

Performance Evaluation on Extended Routing Protocol of AODV in Manet

Performance Evaluation on Extended Routing Protocol of AODV in Manet

... collection of mobile nodes that form a wireless network and the mobile nodes dynamically communicate to other nodes without the use of any preplanned ...router and forwards data packets to ... See full document

11

Influence of tungsten and titanium on the structure of chromium cast iron

Influence of tungsten and titanium on the structure of chromium cast iron

... properties of materials used for parts of machinery and equipment constituting the friction ...resistance and friction coefficient of the material in sliding pairs, depending on ... See full document

4

Value-Added Business Based On Small Scale Of Fisheries A Case Study On Nortern And Shouthern Coasts Of  Java Lamongan And Pelabuhanratu Regency Indonesia

Value-Added Business Based On Small Scale Of Fisheries A Case Study On Nortern And Shouthern Coasts Of Java Lamongan And Pelabuhanratu Regency Indonesia

... development of fisheries sector was expected to keep the economy growth stable, to absorb more labor forces, to produce high foreign exchange, and the most important thing is to increase the income per ... See full document

6

Bounded energy waves on the black hole interior of Reissner–Nordström–de Sitter

Bounded energy waves on the black hole interior of Reissner–Nordström–de Sitter

... formulation of SCC that forbids the generic existence of continuous extensions of the metric with squared integrable connection ...proof of such formulation of the conjecture would save ... See full document

23

The modification process of AlSi21CuNi silumin and its effect on change of mechanical properties of the alloy

The modification process of AlSi21CuNi silumin and its effect on change of mechanical properties of the alloy

... modifiers of hypereutectic ...nucleus of the crystallization. In the studies [11-12] is presented a new view on interaction of phosphorus in process of modification of ... See full document

4

Impact of Black-Scholes Assumptions on Delta Hedging

Impact of Black-Scholes Assumptions on Delta Hedging

... reason of only having call options, which ought to gain value should the underly- ing price go up, considered for the tests is really not relevant for this analysis, as we could as well use puts, long or short ... See full document

27

Show all 10000 documents...