Welcome![Sign In][Sign Up]
Location:
Search - malicious nodes

Search list

[P2PANewTrustModelBasedonReputationandRiskEvaluation.r

Description: 针对目前大规模 P2P 系统不能有效处理恶意节点攻击的问题,该文提出一种新的基于信誉与风险评价的 P2P 系统信任模型,该模型考虑到节点的动态行为影响信任度计算的不确定性,引入风险因素,并提出采用信息 熵理论来量化风险,将实体之间的信任程度和信任的不确定性统一起来。仿真试验及分析表明,该信任模型能够有 效识别恶意节点,相比已有的一些信任模型较大程度地提高了系统成功交易率,可以使节点之间更有效地建立信任 关系。 -View of the current large-scale P2P systems can not effectively deal with malicious nodes to attack the problem, the paper presents a new risk assessment based on credibility and trust model of P2P system, the model taking into account the impact of the dynamic behavior of nodes trust the calculation of uncertainty, the introduction of risk factors, and to make use of information entropy theory to quantify the risks, will be the degree of trust between the entities and trust uncertainty unified. Simulation and analysis show that the trust model can effectively identify the malicious node, compared to some of the existing trust model to a greater extent to improve the system the rate of successful transactions, you can make between nodes more effectively to establish a relationship of trust.
Platform: | Size: 97280 | Author: 刘峰 | Hits:

[Communication-Mobiledetect-malicious-nodes-incollabarative-spectrun-s

Description: this ppaper contains malicious nodes in collabarative spectrum sensing
Platform: | Size: 193536 | Author: Mahendra | Hits:

[LabViewfunction-TDSR

Description: Ad-hoc networks refer to temporary networks which form for special purposes. Mobile ad-hoc networks (MANETs) are networks which use no network assisting element for routing, but every node has the role of router and actively participates in data forwarding. Security problems in MANETs are specified and investigated separately, because in these infrastructureless networks, in addition to all available problems in a wired or wireless network, there are some more problems. Since all connections are available in wireless form and they are audible, so they can be changeable. Also nodes themselves are involved in routing, so existence of a malicious node can lead to the destruction of the network and one of the most important challenges in these networks
Platform: | Size: 12288 | Author: shadi | Hits:

[LabViewaodv-malicious-examples.tar

Description: adding malicious nodes into existing aodv protocol in ns2
Platform: | Size: 5120 | Author: dinesh | Hits:

[Software EngineeringErrack

Description: SECURE INTRUSION-DETECTION SYSTEM FOR MANETS Abstract: Our goal is to detect malicious nodes by proposing a new IDS specially designed for MANETs ,which aims to solve receiver collision limited transmission power false misbehavior problem. -SECURE INTRUSION-DETECTION SYSTEM FOR MANETS Abstract: Our goal is to detect malicious nodes by proposing a new IDS specially designed for MANETs ,which aims to solve receiver collision limited transmission power false misbehavior problem.
Platform: | Size: 5124096 | Author: robin | Hits:

[Technology Managementfinal

Description: Project on manet to detecting malicious nodes using proposed hybrid reputation system in manet
Platform: | Size: 479232 | Author: ganapathi | Hits:

[Industry researchCooperative-Security-for-Network-

Description: 本文提出了网络编码,减少了验证对飞块成本,有效地防止恶意块的传播实用的安全解决方案。在我们的方案中,用户不仅合作发布内容,但用户也合作来保护自己免受恶意用户通知受影响的节点时,一个恶意的块被发现。-This paper presents a practical security scheme for network coding that reduces the cost of verifying blocks on-the-fly while efficiently preventing the propagation of malicious blocks. In our scheme, users not only cooperate to distribute the content,but (well-behaved) users also cooperate to protect themselves against malicious users by informing affected nodes when a malicious block is found.
Platform: | Size: 460800 | Author: allen | Hits:

[Internet-Networkbbv

Description: 论文调研了复杂网络的结构特征,基于复杂网络的方法对在线社会网络的多种属性进行了分析,并利用MATLAB仿真工具对在线社会网络数据源进行了仿真,论文重点分析了在线社会网络的度分布、集聚系数、平均最短路径三个基本特征量,仿真实验结果表明在线社会网络具有小世界特性和无标度特性;然后,基于节点收缩的方法对网络节点重要性进行评估,根据节点重要度找出在线社会网络中的核心节点;进而,采用标签传播算法对在线社会网络进行社团划分,改进了算法的结条件,可在不影响划分结果的前提下,大大提高了运算效率。-Studies show that many social networks have the characteristics of the complex network, researching the basic characteristics of the network can help us to understand the various characteristics of social network By researching the importance of network nodes, we can find the Hub node of the network, it provides the basis of preventing the malicious attacks, protecting critical node or getting a better network transmission By researching the community structure of network can help us understand the relationship between the individual networks and achieve the maximization of network availability.
Platform: | Size: 1024 | Author: 刘雅婷 | Hits:

[Embeded Linuxmalicious-codes

Description: analysis of malicious nodes in wireless sensor networks
Platform: | Size: 19456 | Author: venkat | Hits:

[Software Engineering9856213

Description: 本论文主要介绍了在移动AdHoc网络中基于信誉机制的恶意节点识别方法研究-This paper introduces a method to identify malicious nodes based on the credibility of the mechanism of the mobile Ad Hoc Networks
Platform: | Size: 881664 | Author: 李朝 | Hits:

CodeBus www.codebus.net