• No results found

[PDF] Top 20 Flooding Attack in Delay Tolerant Network

Has 10000 "Flooding Attack in Delay Tolerant Network" found on our website. Below are the top 20 most common "Flooding Attack in Delay Tolerant Network".

Flooding Attack in Delay Tolerant Network

Flooding Attack in Delay Tolerant Network

... of network to tune that is gathered by statistical ...in network and may fail these techniques by injecting erroneous ...of flooding attack for probabilistic routing protocols and discussed a ... See full document

9

An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks

An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks

... Sensor Network (WSN) is a collection of autonomous nodes, which communicates in wireless medium with small frequency and bandwidth consumption ...the network and this helps in construction of routes in the ... See full document

9

Real time delay tolerant feature approximation technique for 
		DDoS attack detection to improve network performance

Real time delay tolerant feature approximation technique for DDoS attack detection to improve network performance

... the network, the features are being extracted and the extracted features have a hop address through which the packet being ...of network topology identifies the set of available paths to reach the service ... See full document

8

Title: Impact of AODV under Black Hole and Flooding Attack

Title: Impact of AODV under Black Hole and Flooding Attack

... temporary network without the aid of any infrastructure or any centralized ...and flooding attacks can be easily deployed into the MANETs by the ...hole attack, a malicious node falsely replies to ... See full document

7

Rapid Emergncy Message Dissemination Routing In Delay Tolerant Network

Rapid Emergncy Message Dissemination Routing In Delay Tolerant Network

... as delay tolerant network occurs on the ...The delay-tolerant routing protocols are well suited for disconnected and delay tolerant network which provides the ... See full document

5

A novel queue management policy for delay tolerant networks

A novel queue management policy for delay tolerant networks

... a flooding protocol, buffer management is exacerbated by the difficulty in obtaining global knowledge of bundles and other ...expected delay and the probability that a bundle has been delivered or will be ... See full document

23

Survey on Encryption Techniques in Delay and Disruption Tolerant Network

Survey on Encryption Techniques in Delay and Disruption Tolerant Network

... Attacks on secret information occurred in three different types. They are attacks of content modification, worm attacks, and lack of cooperation in mobile nodes. The modification attacks modify the message and path and ... See full document

6

Fog Route: Distribution of Data using Delay Tolerant Network

Fog Route: Distribution of Data using Delay Tolerant Network

... insider attack, a fog administrator may beauthorized to manage fog instances but may instantiate a rogue fog instance rather than alegitimate ...man-in-the-middle attack in fogcomputing, before which the ... See full document

8

A Survey on Detection of Malicious Nodes in Delay Tolerant Network

A Survey on Detection of Malicious Nodes in Delay Tolerant Network

... In Delay Tolerant Networks (DTNs), the information is transferred from its source to destination without end-to-end connectivity of the ...network. Delay Tolerant Networking (DTN) is an ... See full document

6

A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

... In delay tolerant network Communication is possible even if end-to-end connectivity is never ...of network are different from other kinds of networks. Delay-tolerant networking ... See full document

5

An Efficient Trust Management Technique for Delay Tolerant Network

An Efficient Trust Management Technique for Delay Tolerant Network

... In the system every node predicted that intermediate nodes (or vehicles) are relaying the message properly. However malicious node not carries the message properly in the network which causes multi-hop ... See full document

5

A Framework and Mathematical Modeling for the Vehicular Delay Tolerant Network Routing

A Framework and Mathematical Modeling for the Vehicular Delay Tolerant Network Routing

... changing network topology and thus are not suitable for sparse networks with intermittent ...the network, therefore, the vehicular traffic model is also ...vehicular network which requires ... See full document

15

Social Network Analysis for Routing in Disconnected Delay Tolerant MANETs

Social Network Analysis for Routing in Disconnected Delay Tolerant MANETs

... Epidemic Routing [38] provides message delivery in disconnected environments where no assumptions are made in regards to con- trol over node movements or knowledge of the network’s future topology. Each host maintains a ... See full document

9

A Group Based Control Flooding Routing Algorithm for Delay Tolerant Network

A Group Based Control Flooding Routing Algorithm for Delay Tolerant Network

... sensor network for monitoring ecological environment, an oceans sensor networks, a vehicle networks, a military Ad-Hoc networks, a disaster recovery networks, a rural communication networks and many ... See full document

10

Title: A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

Title: A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

... for Delay Tolerant Network. A network in public domain suffers from various internal and external ...the network and affects the reliability of ...the network to identify the ... See full document

6

A SURVEY ON DELAY TOLERANT NETWORK

A SURVEY ON DELAY TOLERANT NETWORK

... The use of intermediate nodes as relays offers extraordinary opportunities for security attacks, including compromising information integrity, authenticity, user privacy and system performance. It is important to the ... See full document

6

Title: A Study on MAC Level Architecture Exploration for Delay Tolerant Network

Title: A Study on MAC Level Architecture Exploration for Delay Tolerant Network

... of Delay Tolerant Network applied on different layers of ...the network. Author observed the real time problem in the network and provided the wait time adaptive communication in the ... See full document

5

IMPROVING THE THROUGHPUT OF IOT DEVICES FOR SMART CITIES

IMPROVING THE THROUGHPUT OF IOT DEVICES FOR SMART CITIES

... conventional network gateways reported in the literature are unable to provide sustainable solutions to the challenges poste d by the massive amounts of D2D communications requests, especially in the context of ... See full document

9

Message Size and TTL Based Congestion Control in Delay Tolerant Networks

Message Size and TTL Based Congestion Control in Delay Tolerant Networks

... As in the case of the ICNs there could be long delays in between the two connections, so there is the need of the buffer space in the gateways so that they can hold the information for the time till the next contact ... See full document

10

Vehicular Delay Tolerant Network Routing Schemes: A Review

Vehicular Delay Tolerant Network Routing Schemes: A Review

... nodes placed along the roads in order to communicate messages. Some of the prospective applications for these networks are th e following: wa rnings regarding traffic conditions (unforeseen jams etc.),road accident ... See full document

7

Show all 10000 documents...