• No results found

[PDF] Top 20 A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

Has 10000 "A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network" found on our website. Below are the top 20 most common "A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network".

A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

... in network It gives a new randomized algorithm for achieving consensus among asynchronous processes that communicate by monitoring for every node in the entire network based on node ... See full document

5

Real time delay tolerant feature approximation technique for 
		DDoS attack detection to improve network performance

Real time delay tolerant feature approximation technique for DDoS attack detection to improve network performance

... Intrusion Detection System [3], it is intended for wireless set of ...planned scheme lies in its frivolous design, which require less dispensation and reminiscence resources plus it can be second-hand in ... See full document

8

An Efficient Trust Management Technique for Delay Tolerant Network

An Efficient Trust Management Technique for Delay Tolerant Network

... forwarding scheme is presented by Mohamed Elsalih Mahmoud [6], they named it ...The scheme has feature to operate in a fully distributed manner to defend various attacks without depending upon any ... See full document

5

Survey on Encryption Techniques in Delay and Disruption Tolerant Network

Survey on Encryption Techniques in Delay and Disruption Tolerant Network

... offloading scheme to reduce the induced overhead at resource-constrained ...other trusted neighbor devices called assistant ...for trusted unconstrained nodes in its neighborhood and it delegates to ... See full document

6

A Survey on Detection of Malicious Nodes in Delay Tolerant Network

A Survey on Detection of Malicious Nodes in Delay Tolerant Network

... H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, say about the credit-based incentive scheme for the selfish nodes in delay tolerant network. The selfish nodes are the serious threat for the ... See full document

6

A Secure i-Trust Scheme in Delay Tolerant Networks

A Secure i-Trust Scheme in Delay Tolerant Networks

... misbehavior detection and reputation management scheme is highly desirable in ...misbehavior detection schemes work well for the traditional wireless networks, the unique network ... See full document

8

Detection of Misbehaviour Activities in Delay Tolerant Network Using Trust Authority

Detection of Misbehaviour Activities in Delay Tolerant Network Using Trust Authority

... that Delay Tolerant Networks (DTNs) are a class of networks characterized by lack of guaranteed connectivity, typically low frequency of encounters between DTN nodes and long propagation delays within the ... See full document

5

Probabilistic Misbehaviour Detection and Optimization in Delay Tolerant Network

Probabilistic Misbehaviour Detection and Optimization in Delay Tolerant Network

... propagation delay. The basic idea behind DTN network is that endpoints aren't always unceasingly ...disruption- tolerant than TCP/IP. A delay tolerant network (DTN) is a ... See full document

7

Distributed Misbehavior Detection Scheme for Delay Tolerant Networks

Distributed Misbehavior Detection Scheme for Delay Tolerant Networks

... Delay Tolerant Network (DTN) communication is used whenever traditional networks fail to deliver the data. DTNs are helpful and the best solution to the intermittently connected devices. DTN uses ... See full document

5

An Efficient Intrusion Detection Scheme for Mitigating Nodes Using Data Aggregation in Delay   Tolerant Network

An Efficient Intrusion Detection Scheme for Mitigating Nodes Using Data Aggregation in Delay Tolerant Network

... the network performance of DTN, Therefore, a misbehavior detection and mitigation protocol is highly desirable to assure the secure DTN routing as well as the establishment of the trust among DTN nodes in ... See full document

16

Fog Route:Distribution of Data using Delay Tolerant Network

Fog Route:Distribution of Data using Delay Tolerant Network

... We have outlined the vision and delayed key characteristics Of Fog Computing, a platform to deliver a rich portfolio of new services and applications at the edge of the network. The motivating examples peppered ... See full document

5

Misbehavior Node In Vdtn(Vehicular Delay Tolerant Network)

Misbehavior Node In Vdtn(Vehicular Delay Tolerant Network)

... the network under a given mobility and cooperation model but also for the network load, it can be defined as the average time needed to finish transmitting messages to their ... See full document

7

A trust scheme for discovering and quarantine the 
		misbehaviors in manet

A trust scheme for discovering and quarantine the misbehaviors in manet

... Reputation Manager Module implements Certificate Authority to assign certificates to the nodes in the network group based on their reputation. The nodes with higher trust values computed by the Reputation ... See full document

6

Title: A Study on MAC Level Architecture Exploration for Delay Tolerant Network

Title: A Study on MAC Level Architecture Exploration for Delay Tolerant Network

... of Delay Tolerant Network applied on different layers of ...Collision Detection on multiple ...the network. Author observed the real time problem in the network and provided the ... See full document

5

Cluster based priority traverse processing for efficient data collection 
		in WSN

Cluster based priority traverse processing for efficient data collection in WSN

... Static sink is fed with information of optimum shortest distance from any cluster to all other clusters in the network. The shortest distance calculation is based upon Minimum spanning tree (MST) algorithm. The ... See full document

6

A novel queue management policy for delay tolerant networks

A novel queue management policy for delay tolerant networks

... and delay by prioritizing bundles during ...this scheme outperforms the current state of the art for quota protocols, flooding protocols still suffer from an efficient drop/forward ... See full document

23

Message Size and TTL Based Congestion Control in Delay Tolerant Networks

Message Size and TTL Based Congestion Control in Delay Tolerant Networks

... As in the case of the ICNs there could be long delays in between the two connections, so there is the need of the buffer space in the gateways so that they can hold the information for the time till the next contact ... See full document

10

Vehicular Delay Tolerant Network Routing Schemes: A Review

Vehicular Delay Tolerant Network Routing Schemes: A Review

... PBRS[9] uses the concept of relaying vehicle. Roadside units cannot cover all the area of communication and deploying large number of RSUs can increase the overall cost. So the concept of relaying vehicle is uses which ... See full document

7

Behavioral Malware Detection In delay Tolerant Networks

Behavioral Malware Detection In delay Tolerant Networks

... We present a proposition for between district steering in view of both probabilistic and deterministic sending instruments, implanted in a structural casing work ready to help it. We additionally contrast our answer with ... See full document

6

Proximity Malware Detection in Delay Tolerant Networks

Proximity Malware Detection in Delay Tolerant Networks

... Mobile shopper natural philosophy permeate our lives. laptop computer computers, PDAs, and additional recently and conspicuously, smart-phones, are getting indispensable tools for our educational, skilled, and ... See full document

6

Show all 10000 documents...