Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 41-45 of 45 total results
 Making Wireless Work A Survey of Secure Wireless Ad Hoc ...
ad hoc networking applications, security in the routing protocol is necessary to guard against attacks such as mali-cious routing misdirection. This article reviews attacks on ad hoc networks and discusses current approache...
Secured Approach towards Reactive Routing Protocols Using ...
In the current era of Internet of things (IoT), the wireless sensor networks functionality is ... MANETS and analyze the threats and types of attacks in the routing protocols. The reasons for ... Yang, P. & Dong, Y.,“Information -centric mobile ad...
https://arxiv.org/pdf/1904.01826
Average Rating (0 votes)
 RESEARCH ARTICLE An Analysis and Prevention of Routing ...
Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method. Proc. Int'l. J. Network Sec., 2006. [10] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile...
A review current routing attacks in mobile ad-hoc networks ...
Presentation Mode Open Print Current View. Tools. Zoom Out. Zoom In. More Information Less Information Close Enter the password to open this PDF file: Cancel OK. File name:-File size:-Title:-Author:-Subject:- ...
https://core.ac.uk/reader/11784107
Average Rating (0 votes)
 Review of Prevention and Detection Methods of Black Hole ...
The performance of the network parameters like routing overhead, end to end delay, throughput, packet delivery ratio are compared in all the scenarios. Keywords: Mobile Ad hoc Network (MANET); Blackhole Attack; AODV Routing Protocol. 1. Introdu...
1 2 3 4 5
Pages
|