Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 21-30 of 45 total results
IJCA - Performance Analysis of AODV & DSR Routing Protocol ...
Elizabeth M. Royer and Chai-Keong Toh, ―A review of current routing protocols for ad hoc mobile wireless networks, Technical report, University of California and Georgia Institute of Technology, USA, 1999.
 A Literature Review of Security Attack in Mobile Ad-hoc ...
adaptive. Device in mobile ad hoc network should be able to detect the presence of other devices and perform necessary set up to facilitate communication and sharing of data and service. Ad hoc networking allows the devices to maintain connections to the network as well as easily adding and removing devices to and from the network....
A survey of secure wireless ad hoc routing - IEEE Journals ...
Abstract: Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The article reviews attacks on ad hoc networks and discusses current approaches for establishing cryptographic keys in ad hoc networks....
 A Review on Mobile Ad-hoc Networks (MANET’S) with Attacks ...
A Review on Mobile Ad-hoc Networks (MANET’S) with Attacks Impact Kanchan Bala Mtech Student, Department of Computer Science ... routing protocols. 1. Introduction A mobile ad hoc network (MANET) is a spontaneous ... knowledge of the current network topology and...
onlinejournal.in/IJIRV5/002.pdf
Average Rating (0 votes)
Ad-Hoc Wireless Networks - Practice Test Questions ...
Ad-hoc networks are antiquated and there are no current methods to secure them. It is easy for untrusted and unknown devices to participate in an ad-hoc network. Antivirus is not able to work on ...
Wireless ad hoc network - Wikipedia
A wireless ad hoc network (WANET) or Mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, so the determination of ......
Secure Routing and Data Transmission in Mobile Ad Hoc Networks
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 DOI : 10.5121/ijcnc.2014.6108 111 Secure Routing and Data Transmission in Mobile Ad Hoc Networks Waleed S. Alnumay and Uttam Ghosh
https://arxiv.org/pdf/1402.2108
Average Rating (0 votes)
An Opportunistic Routing to Encounter Black Hole Attack in ...
This paper proposes a routing mechanism that is designed to prevent a black hole attack on Ad-hoc On-demand Distance Vector-based Mobile Ad-hoc Networks. The proposed approach will provide security to the data that is sent from source to destination using multiple paths and it will protect the data from the Black Hole Attack....
Mitigating Collaborative Blackhole Attacks on DSR-Based ...
A Mobile ad hoc network (MANET) is a collection of mobile nodes that rely on co-operation amongst devices that route packets to each other. ... Khokhar, R.H., Ngadi, A.N., Mandala, A.: A review of current routing attacks in mobile ad hoc networks. International Journal of Computer Science and Security 3, 18–29 (2008) Google Scholar. 5. Royer ......
A DEFENSE SYSTEM ON DDOS ATTACKS IN MOBILE AD HOC NETWORKS
two of the most harmful threats to the network functionality. Mobile Ad Hoc Networks (MANET) are even more vulnerable to such attacks. Ad Hoc On-Demand Distance Vector (AODV) is an outstanding wireless routing protocol. However, AODV has significant security vulnerabilities. Most current proposed security strategies for AODV or other MANET routing...
1 2 3 4 5
Pages
|