مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

29
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

15
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Algorithm Based on Trap Packet to Detect Black Hole Attack in Ad-Hoc Networks Using Common Methods

Pages

  31-43

Abstract

 Mobile ad hoc networks include sets of nodes that can freely communicate with each other without having any network infrastructure and through radio frequencies. These networks' speed of establishment and unstructured nature has made them critical in various fields, especially military and emergency applications. The issue of security in these networks is one of the most important research topics today. Mobility of nodes, mobility of communication, dynamic change of network structure, lack of centralized management to check behaviors and functions, lack of specific defense lines, and limitation in consumption power of nodes provide a suitable platform for various attacks against these networks. The attacks in these networks are somehow different from those in other networks, and of course, the Systems used to detect attacks in these networks are different from those in common wired networks. Mobile ad hoc networks are collections of mobile nodes that can be dynamically formed anywhere and anytime without network infrastructure. Most of these node’s act as Routers and hosts at the same time. This property has made it possible to use these networks when forming a network with a fixed and predefined structure, such as military cases or floods, is impossible. Communication between nodes in these networks is done through Radio Waves, and if a node is in the radio range of another node, it is considered a neighbor of that node, and otherwise, if there is a need for communication between two nodes that are in the radio range of each other are not, the help of other nodes can be used in this case. Therefore, the communication between nodes in these networks is somehow based on trust and cooperation between nodes. What needs to be paid special attention to in the applications of these networks is the limitation of the resources used in them. Therefore, the evaluation criteria of these networks differ from those of wired networks.

Multimedia

  • No record.
  • Cites

  • No record.
  • References

  • No record.
  • Cite

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button