TAILIEUCHUNG - Distributed security system for mobile ad hoc computer networks

This paper describes the different types of attacks that are very common . the Distributed Denial of Service attack, the Blackhole attack and the Wormhole attack, also provide the mechanism to detect these attacks using the different techniques and the relative comparison between these three attacks. | ISSN:2249-5789 Krutika K Chhajed et al , International Journal of Computer Science & Communication Networks,Vol 5(3),184-191 Distributed Security System for Mobile Ad-Hoc Computer Networks K. Chhajed Department of Computer Science & Engg. PRMIT & R, Badnera Abstract— Ad-hoc wireless networks are increasing in popularity, due to the spread of laptops, sensor devices, PDAs and other mobile electronic devices. These devices will eventually communicate with each other and hence there is a need of security in paper describes the different types of attacks that are very common . the Distributed Denial of Service attack, the Blackhole attack and the Wormhole attack, also provide the mechanism to detect these attacks using the different techniques and the relative comparison between these three attacks. It provides a comparison of some of the common parameters on the different nodes in these different types of attack scenario. So that a novel and optimum solution can be provided, this can secure the nodes from different types of attacks. Keyword: MANET, DDoS attack, Blackhole, Wormhole attack. INTRODUCTION Ad-hoc wireless networks are increasing in popularity, due to the spread of laptops, sensor devices, PDAs and other mobile electronic devices. These devices will eventually need to communicate with each other. However there is a need to implement a secure ad hoc network that might be used in emergency services, disaster assistance, and military applications. The security includes controls to limit access to the network, in order to protect it from intruders or unwanted bystanders. Mobile Ad hoc Networks are the networks formed for a particular purpose. These networks assume that an end to end path between the nodes exists. They are often created on-the-fly and for one-time or temporary use. They find their use in special applications like military, disaster relief etc that are in a need of forming a new infrastructure less network with all .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.