A New Scheme for Detecting and Preventing Gray Hole Attacks in Mobile Ad Hoc Network
سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 751
فایل این مقاله در 9 صفحه با فرمت PDF قابل دریافت می باشد
- صدور گواهی نمایه سازی
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
KBEI02_054
تاریخ نمایه سازی: 5 بهمن 1395
چکیده مقاله:
Gray hole attacks are regarded as a kind of black hole attacks which are produced by malicious nodes in ad hoc networks. These attacks are produced as a result of extensive advertisements in response to path requests made on the part of the source node in a network. Indeed, malicious nodes deceive normal nodes of the network and announce that they possess the shortest path for reaching the destination. Hence, normal nodes register the malicious nodes as new members in the transmission and reception process; however, malicious nodes suddenly show negative behaviors and they remove a significant amount of the reached packets. Many research studies have been done to preventthis type of attacks in ad hoc networks and some findings have beenobtained in this regard. The purpose of the present study was to propose a method so as to optimize and maintain protocols which transmit and receive data in wireless networks. In this study, through the collaboration of legal nodes, a method was proposed which was intended to detect and isolate gray hole attacks in the network. NS2 simulator was used to simulate and check the validity of the proposed method.
کلیدواژه ها:
نویسندگان
Mohsen Khani
Department of Computer Engineering, Germi Branch, Islamic Azad University, Germi
Ali Ghaffari
Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran
مراجع و منابع این مقاله:
لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :