Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Routing attacks"

ADD TO MY LIST
 
A Better Approach towards Securing Mobile Adhoc Network

Author(s): Amit Chauhan | Arti Patle | Anita Mahajan
Intrusion Detection for Routing Attacks in Sensor Networks

Author(s): Chong Eik Loo | Mun Yong Ng | Christopher Leckie | Marimuthu Palaniswami
Network Layer Attacks and Defense Mechanisms in MANETS- A Survey

Author(s): G.S. Mamatha | Dr. S.C. Sharma
A Literature Review of Security Attack in Mobile Ad-hoc Networks

Author(s): Priyanka Goyal | Sahil Batra | Ajit Singh
Security in Wireless Sensor Networks using Frequency Hopping

Author(s): Gaurav Sharma | Suman Bala | A. K. Verma | Tej Singh
SECURE ROUTING IN WIRELESS SENSOR NETWORKS: ROUTING PROTOCOLS

Author(s): A.Senthilkumar, | Dr.C.Chandrasekar
Multicast Routing Authentication System using Advanced Tesla

Author(s): V. Ganesh Babu | T. Senthil Kumar
A Secure Cluster-Based Multipath Routing Protocol for WMSNs

Author(s): Islam T. Almalkawi | Manel Guerrero Zapata | Jamal N. Al-Karaki
A Survey on Intrusion in Ad Hoc Networks and its Detection Measures

Author(s): Ms. Preetee K. Karmore, | Ms. Sonali T. Bodkhe
Secured Greedy Perimeter Stateless Routing For Wireless Sensor Networks

Author(s): P. Samundiswary | D.Sathian | P. Dananjayan
A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS

Author(s): NALLAMALA SRI HARI | , DR. N. SRINIVAS RAO | DR. N. SATYANARAYANA
A New Approach to Prevent Black Hole Attack in AODV

Author(s): M. R. Khalili Shoja | Hasan Taheri | Shahin Vakilinia
A VIEW ON SECURE ROUTING IN ADHOC NETWORKS

Author(s): V. Venkata Ramana, | K.K.Basheer | P.Srinivasa Rao
Design and Implementation of EAR Algorithm for Detecting Routing Attacks in WSN

Author(s): Dimple Juneja | Sandhya Bansal | Gurpreet Kaur | Neha Arora
A System of Umpires for Security of Wireless Mobile Ad Hoc Network

Author(s): Ayyaswamy Kathirvel | Rengaramanujam Srinivasan
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks

Author(s): Asad Amir Pirzada | Chris McDonald
The Impact of Window’s Size in DWSIGF Routing Protocol

Author(s): Z.M. Hanapi | M. Ismail | K. Jumari | M. Mahdavi | H. Mirvaziri
Secure Banking: Authenticating Peer-to-Peer Ad Hoc Interactions

Author(s): Khalid Mahmood | Imran Hameed | Khalid Rashid | Amir Qayyum
Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Author(s): Manoj Kumar Mishra | Binod Kumar Pattanayak | Alok Kumar Jagadev | Manojranjan Nayak
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks

Author(s): Eyad Taqieddin | S. Jagannathan | Ann Miller
Potential Security Attacks on Wireless Networks and their Countermeasure

Author(s): Sreedhar. C | S. Madhusudhana Verma | N. Kasiviswanath
An Efficient Intrusion Detection System for Mobile Ad Hoc Networks

Author(s): B.V. Ram Naresh Yadav, B.Satyanarayana, O.B.V.Ramanaiah
Performance Evaluation of MANET Routing Protocols Under Black Hole Attack

Author(s): M.Umaparvathi and Dr. Dharmishtan K Varughese
High Performance Certificate Authority Scheme in Manet

Author(s): A.Rajaram and Dr.S.Palaniswami
Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANETs

Author(s): K.Selvavinayaki | K.K.Shyam Shankar | Dr.E.Karthikeyan
MOSAODV: Solution to Secure AODV against Blackhole Attack

Author(s): N. H. Mistry, D. C. Jinwala and M. A. Zaveri
Design and Development of a Secured Routing Scheme for Mobile Adhoc Network

Author(s): Rakesh Kumar | Dr. Piush Verma | Dr. Yaduvir Singh
Secure Routing In Wireless Sensor Networks

Author(s): A.Senthilkumar | Dr. C.Chandrasekar
Analyzing security of Authenticated Routing Protocol (ARAN)

Author(s): Seema Mehla | Bhawna Gupta | Preeti Nagrath
Prevention Of WormholeAttacks In Geographic Routing Protocol

Author(s): E.Poornima, | C.Shoba Bindhu
Multihost ad-hoc network with the clustered Security networks

Author(s): J.Manikandan, | S.Vijayaragavan.
THE MODIFIED SECURITY SCHEME FOR DATA INTEGRITY IN MANET

Author(s): A.Rajaram, | Dr.S.Palaniswami
ESAC Based Channel Aware Routing Using Route Handoff

Author(s): Dr. V.Kavitha, | S.Balaji
Modified AODV Protocol against Blackhole Attacks in MANET

Author(s): K. Lakshmi | S.Manju Priya, | A.Jeevarathinam, | K.Rama, | K. Thilagam
A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks

Author(s): K.P.Manikandan | Dr.R.Satyaprasad | Dr.K.Rajasekhararao
A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network

Author(s): Anupriya Sharma | Paramjeet Rawat | Suraj Malik | Sudhanshu Gupta
Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks

Author(s): Raj Shree | Sanjay Kr. Dwivedi | Ravi Prakash Pandey
DPA to Rectify Transient Faulty Nodes in Effective Manner

Author(s): P. S. Balamurugan | K.Thanushkodi
Security Measures for Black Hole Attack in MANET: An Approach

Author(s): Rajib Das, | Dr. Bipul Syam Purkayastha, | Dr. Prodipto Das
Secure Measures for the Vulnerabilities in MAODV

Author(s): P. Bharathi | A. Amuthan
A Fuzzy QOS Keybase Secured Manet Routing with Multipath Data Fragmentation (FQKSMR)

Author(s): Manjunath Gadiparthi | Ramakrishna Paladugu | Sudhakar Paladugu | Muralidhar Vejendla
Implementation of Direct Processor Access in Transient Faulty Nodes

Author(s): P. S. Balamurugan | K.Thanushkodi
Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks

Author(s): Mohamed Hamdy Eldefrawy | Muhammad Khurram Khan | Khaled Alghathbar | Ahmed Saleh Tolba | Kyngn Jung Kim
Path Selection Technique for Highly Transmission Ratio and Reliable Routing in Manet

Author(s): H. Sh. Jassim | S. Yussof | S.K. Tiong | K.H. Chong | S.P. Koh
A Survey on Black Hole Attacks on AODV Protocol in MANET

Author(s): Madhusudhananagakumar KS | G. Aghila
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator

Author(s): H. A. Esmail | M. R. Khalili Shoj | Hossein gharaee
Black Hole Detection in MANET Using AODV Routing Protocol

Author(s): Govind Sharma | Manish Gupta
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks

Author(s): Sridhar Subramanian | Baskaran Ramachandran
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji
A New MANET Wormhole Detection Algorithm Based on Traversal Time and Hop Count Analysis

Author(s): Jonny Karlsson | Laurence S. Dooley | Göran Pulkkis
Authentication Based on Multilayer Clustering in Ad Hoc Networks

Author(s): Lee Keun-Ho | Han Sang-Bum | Suh Heyi-Sook | Lee Sang Keun | Hwang Chong-Sun
Attack Distribution Modeling and Its Applications in Sensor Network Security

Author(s): Chen Xiangqian | Makki Kia | Yen Kang | Pissinou Niki
SPM: Source Privacy for Mobile Ad Hoc Networks

Author(s): Ren Jian | Li Yun | Li Tongtong
Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

Author(s): García-Otero Mariano | Zahariadis Theodore | Álvarez Federico | Leligou HelenC | Población-Hernández Adrián | Karkazis Panagiotis | Casajús-Quirós FranciscoJ
Cautious Rating for Trust-Enabled Routing in Wireless Sensor Networks

Author(s): Maarouf Ismat | Baroudi Uthman | Naseer AR
Network Coding Based Security for Routing Attacks in WRN: Frechet Interference and Rayleigh Outage Evaluation

Author(s): R. Villalpando-Hernández | C. Vargas-Rosales | D. Muñoz-Rodríguez | J. R. Rodríguez
Evaluation of Security Conditions of Protocols for Data Routing in Wireless Sensors Networks

Author(s): Tejpal Singh | Vinod Kumar | Khushboo Saxena | Akanksha Saxena
An Enhanced Secured Dynamic Source Routing Protocol for MANETS

Author(s): G.Lavanya | A. Ebenezer Jeyakumar
A CONTRIBUTION TO SECURE THE ROUTING PROTOCOL

Author(s): Mohammed ERRITALI | Oussama Mohamed Reda | Bouabid El Ouahidi
Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks

Author(s): Hamed Jalali Qomi | Mohammad Hesam Tadayon
Secure Routing Protocol for Multi-hop Wireless Networks

Author(s): Nagaraju Jampani | B.Premamayudu | A.Raghunath
Investigation of Blackhole Attack on AODV in MANET

Author(s): Anu Bala | Raj Kumari | Jagpreet Singh
Guest Editorial

Author(s): Lei Shu | Hsiao-Hwa Chen | Takahiro Hara | Der-Jiunn Deng | Lei Wang
Guest Editorial

Author(s): Lei Shu | Hsiao-Hwa Chen | Takahiro Hara | Der-Jiunn Deng | Lei Wang
MADSN: Mobile Agent Based Detection of Selfish Node in MANET

Author(s): Debdutta Barman Roy | Rituparna Chaki
AODV Robust (AODVR): An Analytic Approach to Shield Ad-hoc Networks from Black Holes

Author(s): Mohammad Abu Obaida | Shahnewaz Ahmed Faisal | Md. Abu Horaira | Tanay Kumar Roy
Grayhole Attack and Prevention in Mobile Adhoc Network

Author(s): Megha Arya | Yogendra Kumar Jain
DEPLOYMENT ISSUES OF SBGP, SOBGP AND pSBGP: A COMPARATIVE ANALYSIS

Author(s): Naasir Kamaal Khan | Gulabchand K. Gupta
Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network

Author(s): Himadri Nath Saha | Dr. Debika Bhattacharyya | Dr. P. K.Banerjee
SURVEY ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK

Author(s): FARAZ AHSAN | ALI ZAHIR | SAJJAD MOHSIN | KHALID HUSSAIN
A Comparative Study of various Secure Routing Protocols based on AODV

Author(s): Dalip Kamboj | Pankaj Kumar Sehgal
A Behavioral Study of Wormhole Attack in Routing for MANET

Author(s): Amrit Suman | Praneet Saurabh | Bhupendra Verma
Minimized Overhead and Administrator based Secure Routing Protocol

Author(s): Himadri Nath Saha | Debika Bhattacharyya | P. K.Banerjee
THE IMAGE LEVEL TAINTING: A NEW APPROACH FOR PREVENTING SQL INJECTION ATTACKS

Author(s): MR. P. NARESH KUMAR | MR .YUGANDHAR .G | MS. N. SOUJANYA | MR. K.NAGESWARA RAO
Encryption Scheme for Secure Routing in Ad Hoc Networks

Author(s): Sunil Taneja | Ashwani Kush | Sima Singh
Sec.AODV for MANETs using MD5 with Cryptography

Author(s): Suketu D. Nayak | Ravindra K. Gupta
A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)

Author(s): Shaik Sahil Babu | Arnab Raha | Mrinal Kanti Naskar
Research on the Active DDoS Filtering Algorithm Based on IP Flow

Author(s): Rui GUO | Hao YIN | Dongqi WANG | Bencheng ZHANG
Providing of Secure Routing against Attacks in MANETs

Author(s): A.Vani | D.Sreenivasa Rao
Comparison of Secure OLSR Routing Protocol

Author(s): KUNWAR PAL, | Prof. SANJEEV SOFAT, | Prof. DIVYA BANSAL
A new approach for Evolution of end to end Security in Wireless Sensor Network

Author(s): S. Anjali Devi, | R. Venu Babu, | B. Srinivasa Rao
A Secure and Power Efficient Routing Scheme for Ad Hoc Networks

Author(s): Ashwani Kush | Divya Sharma | Sunil Taneja
Secure Routing Scheme in MANETs using Secret Key Sharing

Author(s): A. Amuthan | B.Aravind Baradwaj
Preventing AODV Routing Protocol from Black Hole Attack

Author(s): Lalit Himral, | Vishal Vig, | Nagesh Chand
A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

Author(s): Edna E. Nallathambi | Radha Sankararajan | Vaithiyanathan Sundaram | Gracelin Sheeba

Tango Rapperswil
Tango Rapperswil

     Save time & money - Smart Internet Solutions