Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 11-20 of 47 total results
 A Literature Review of Security Attack in Mobile Ad-hoc ...
adaptive. Device in mobile ad hoc network should be able to detect the presence of other devices and perform necessary set up to facilitate communication and sharing of data and service. Ad hoc networking allows the devices to maintain connections to the network as well as easily adding and removing devices to and from the network....
A review of routing protocols for mobile ad hoc networks ...
E.M. Royer, C.-K. TohA review of current routing protocols for ad hoc mobile wireless networks IEEE Personal Communications, 6 (2) (1999), pp. 46-55 Google Scholar
Detect DDoS flooding attacks in mobile ad hoc networks ...
Royer, E.M. and Toh, C-K. (1999) 'A review of current routing protocols for ad hoc mobile wireless networks', IEEE Personal Communications, Vol. 6, pp.46-55. Google Scholar
A Review of Current Routing Attacks in Mobile Ad Hoc ...
A Review of Current Routing Attacks in Mobile Ad Hoc Networks . By Rashid Hafeez Khokhar, Md Asri Ngadi and Satria Mandala. Abstract. A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is ......
https://core.ac.uk/display/28532011
Average Rating (0 votes)
Reducing the Routing Overhead in Secure Mobile AD HOC Networks
Mobile Ad hoc networks are easily affected by various types of network layer attacks. These attacks affect the performance of MANETs drastically. Our proposed Method to reduce the routing overhead in Secure mobile ad hoc network successfully reduce the routing overhead. Using this method the routing overhead will reduce. REFERENCES...
A more secure and scalable routing protocol for mobile ad ...
Ad hoc routing is a very fundamental operation on an ad hoc network; hence, it has been a main target for an attacker to disrupt an ad hoc network 25.Two kinds of attacks that can be launched against ad hoc networks are 20, 26, 27: . Passive attacks: the attacker does not disturb the routing protocol....
A review current routing attacks in mobile ad-hoc networks ...
A review current routing attacks in mobile ad-hoc networks . By Rasheed Hafeez Khokhar, ... Abstract. A mobile ad-hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network ......
https://core.ac.uk/display/11784107
Average Rating (0 votes)
Attacks on mobile ad hoc networks - LinkedIn SlideShare
A Review of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Computer Science and Security, 2:12, 2008. [6] Panos Lekkas; Randall Nichols. WIRELESS SECURITY: Models, Threats, and Solutions. McGraw-Hill, 2002. [7] J. Macker; S. Corson. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation ......
A review of routing protocols for mobile ad hoc networks ...
Elizabeth M. Royer & Chai-Keong Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks". Google Scholar; P. Papadimitratos and Z.J. Haas. "Secure routing: Secure Data Transmission in Mobile Ad Hoc Networks", Proc. ACM Wksp. Wireless Security 2003, Sept. 2003, pp. 41-50. Google Scholar Digital Library...
 A Review of Current Routing Protocols for Ad Hoc Mobile ...
1(15) Hannu_Vilpponen.PPT / 03-02-2004 A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh
1 2 3 4 5
Pages
|