Results 281 to 290 of about 238,447 (346)
Some of the next articles are maybe not open access.
A Study of Black Hole Attacks in Delay Tolerant Network
2021DTN is the latest growing technology having unique characteristics such as longer delays, intermittent connectivity and limited resources or constrained resources. Delay tolerant networks is a store and forward method which delivered the messages to the nearest potential forwarder by replicating copies of the original messages. DTN is created to handle
null Puneet, Anamika Chauhan
openaire +1 more source
Journal of Discrete Mathematical Sciences and Cryptography, 2019
Today Vehicular Networks is not a new term. In the past three to four years, Vehicular Networking has acquired immense publicity especially in the area of Research and Academic Industry.
Ankit Kumar, Madhavi Sinha
semanticscholar +1 more source
Today Vehicular Networks is not a new term. In the past three to four years, Vehicular Networking has acquired immense publicity especially in the area of Research and Academic Industry.
Ankit Kumar, Madhavi Sinha
semanticscholar +1 more source
Discovery of black holes in complex networks
2015Abstract. Networks are vital in today's world. Design and configuration of networks have made the special considerations necessary for its various aspects such as security, integrity, scalability and cost. Malicious nodes on the network must be identified to enhance the resistance of network.
MİRZAEİ, Alireza +2 more
openaire +1 more source
Black Hole Search with Tokens in Interconnected Networks
2009We study the Black Hole search problem using mobile agents in three interconnected network topologies: hypercube, torus and complete network. We do so without relying on local storage. Instead we use a less-demanding and less-expensive token mechanism.
openaire +1 more source
Detection of Black Hole Attack in Delay-Tolerant Network
2019In spite of modernization of humanity, in emergency situations like after any natural calamity our infrastructure-based network backbone gets affected first. Disaster relief volunteers face the immense pain to set up a communication system, due to the failure of telecommunication infrastructure and long-standing power.
Chandrima Chakrabarti +6 more
openaire +1 more source
Cooperative Black-Hole Attack: A Threat to the Future of Wireless Mesh Networking
2011Wireless Mesh Network has come out to be the next generation wireless communication technology. It provides a good solution to cheap wireless networking. The Network Layer in WMN is responsible for routing packets delivery and intruders take a deep interest in sabotaging this layer.
Shree Om, Talib, Mohammad
openaire +1 more source
SAODV: Black hole and gray hole attack detection protocol in MANETs
2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2017S. Dhende +3 more
semanticscholar +1 more source
Symposium on Colossal Data Analysis and Networking, 2016
Sushama Singh +2 more
semanticscholar +1 more source
Sushama Singh +2 more
semanticscholar +1 more source
Detection of single and collaborative black hole attack in MANET
2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016S. M, Arumugam K, S. Neelavathy, Pari
semanticscholar +1 more source
Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario
Symposium on Colossal Data Analysis and Networking, 2016Apurva Jain, U. Prajapati, P. Chouhan
semanticscholar +1 more source

