tailieunhanh - Distributed security system for mobile ad hoc computer networks

This paper describes the different types of attacks that are very common . the Distributed Denial of Service attack, the Blackhole attack and the Wormhole attack, also provide the mechanism to detect these attacks using the different techniques and the relative comparison between these three attacks. | ISSN:2249-5789 Krutika K Chhajed et al , International Journal of Computer Science & Communication Networks,Vol 5(3),184-191 Distributed Security System for Mobile Ad-Hoc Computer Networks K. Chhajed Department of Computer Science & Engg. PRMIT & R, Badnera Abstract— Ad-hoc wireless networks are increasing in popularity, due to the spread of laptops, sensor devices, PDAs and other mobile electronic devices. These devices will eventually communicate with each other and hence there is a need of security in paper describes the different types of attacks that are very common . the Distributed Denial of Service attack, the Blackhole attack and the Wormhole attack, also provide the mechanism to detect these attacks using the different techniques and the relative comparison between these three attacks. It provides a comparison of some of the common parameters on the different nodes in these different types of attack scenario. So that a novel and optimum solution can be provided, this can secure the nodes from different types of attacks. Keyword: MANET, DDoS attack, Blackhole, Wormhole attack. INTRODUCTION Ad-hoc wireless networks are increasing in popularity, due to the spread of laptops, sensor devices, PDAs and other mobile electronic devices. These devices will eventually need to communicate with each other. However there is a need to implement a secure ad hoc network that might be used in emergency services, disaster assistance, and military applications. The security includes controls to limit access to the network, in order to protect it from intruders or unwanted bystanders. Mobile Ad hoc Networks are the networks formed for a particular purpose. These networks assume that an end to end path between the nodes exists. They are often created on-the-fly and for one-time or temporary use. They find their use in special applications like military, disaster relief etc that are in a need of forming a new infrastructure less network with all .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.