Web
Education
Viewing 1-2 of 2 total results
A more secure and scalable routing protocol for mobile ad ...
Ad hoc routing is a very fundamental operation on an ad hoc network; hence, it has been a main target for an attacker to disrupt an ad hoc network 25.Two kinds of attacks that can be launched against ad hoc networks are 20, 26, 27: . Passive attacks: the attacker does not disturb the routing protocol....
ASSESSMENT OF SECURITY IN MOBILE AD-HOC NETWORKS (MANET ...
Attacks on an ad hoc network routing protocols generally fall into one of two categories: routing disruption attacks and resource consumption attacks. In a routing disruption attack, the attacker attempts to cause legitimate data packets to be routed in dysfunctional ways....
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.