Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Elimination of Security Threats Using Trusted Proactive Routing



Год выпуска: 2014
Автор: Shilpa Jaiswal
Издательство: LAP Lambert Academic Publishing
Страниц: 56
ISBN: 9783659266553
Описание
Security is an essential requirement in mobile ad-hoc networks to provide protected communication between mobile nodes.Due to unique characteristics of MANETs,it creates a number of consequential challenges to its security design.To overcome the challenges, there is a need to build a multifaceted security solution that achieves both broad protection and desirable network performance. MANETs are vulnerable to various attacks, black hole, is one of the possible attacks. Black hole is a type of routing attack where a malicious node advertise itself as having the shortest path to all nodes in the environment by sending fake route reply. By doing this, the malicious node can deprive the traffic from the source node.I proposed a TDSDV (Trusted DSDV)Protocol to prevent security threats of black hole by notifying other nodes in the network of the incident.This book emphasis on the behavior of the Black Hole node & its prevention using trusted proactive routing. Considering different scenarios...


Похожие книги

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  3. Harrison Snow. The Power of Team Building: Using Rope Techniques. – М.: Pfeiffer, 1992. – 216 с.
  4. Barrie A. Wigmore. The Crash and Its Aftermath : A History of Securities Markets in the United States, 1929-1933 (Contributions in Economics and Economic History). – М.: , 0. – 0 с.
  5. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  6. Marc Hoffman. Harnessing the Power of the Charitable Remainder Trust - 8th. – М.: , 2010. – 348 с.
  7. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  8. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  9. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с.
  10. A. C. Suthar,D. D. Shah and G. R. Kulkarni. Implementation of Secured Color Image Authentication and Protection. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  11. Saima Afzal. Non-Traditional Security Threats to Pakistan Post 9/11. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  12. Unaza Saqib,Hiba Saqib and Humaira Tariq. Biosorption of Chromium (VI) using Plant Biomass. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  13. MURTAZA IQBAL. The Real Counterinsurgency, Winning Hearts and Repairing Minds. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  14. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  15. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  16. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  17. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с.

Образцы работ

Тема и предметТип и объем работы
Многостороннее регулирование внешней торговли
Международные экономические отношения
Диплом
154 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Управление финансами малого бизнеса
Анализ финансово-хозяйственной деятельности предприятия
Диплом
101 стр.



Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Вера, 13.04
Посмотрела я работу. В принципе все хорошо, мне нравится. Нормативная часть мне ОЧЕНЬ понравилась, 1.3 тоже хорошо!!!Спасибо. Я понимаю и уважаю ваш труд