首页> 外文期刊>Indian Journal of Computer Science and Engineering >A Review of Malicious Attack in Mobile Ad-Hoc Network Based On Power Constraints
【24h】

A Review of Malicious Attack in Mobile Ad-Hoc Network Based On Power Constraints

机译:基于功率约束的移动自组网恶意攻击研究述评

获取原文
           

摘要

The minimization of power in wireless sensor network is big issue. If the process of energyconstraints is optimized increase the reliability and security of mobile ADHOC network. Themanagement of ADHOC network is great challenge due to dynamic infrastructure and mobility of node.Due to mobility of node routing path of network and security of communication suffered. In the processof node mobility and path discovery of routing protocol take huge amount of power and decrease the lifeof network. For the improvement of power and secured communication various protocol are designed butall are limitation in terms of group communication in ADHOC network. A security constraint in mobileADHOC network is very critical task. Some critical security issue such as black hole attack, wormholeattack, sinkhole attack, prevention and detection of attack is major challenge. For the detection ofwormhole attack various authors used various technique such as clock synchronization, threshold basedtechnique, nearest neighbor node selection method.
机译:无线传感器网络中的功率最小化是一个大问题。如果优化能源约束过程,则可以提高移动ADHOC网络的可靠性和安全性。由于节点的动态基础架构和移动性,ADHOC网络的管理面临着巨大的挑战。在节点移动性和路由协议的路径发现过程中,会消耗大量功率并缩短网络寿命。为了提高功率和安全通信,设计了各种协议,但在ADHOC网络中的组通信方面都受到限制。 mobileADHOC网络中的安全约束是非常关键的任务。诸如黑洞攻击,蠕虫攻击,下沉攻击,预防和检测攻击等一些关键的安全问题是主要挑战。为了检测虫洞攻击,各种作者使用了多种技术,例如时钟同步,基于阈值的技术,最近邻居节点选择方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号