АТАКА «ЧОРНА ДІРА» В МЕРЕЖАХ MANET
Анотація
Black-Hole Attack in Mobile Ad-hoc Network
Were discussed the black hole attack problem in the mobile ad-hoc network. There are various techniques which have been proposed by the researcher for dealing with the black hole attacks and these techniques have been classified into various categories according to their basic operation.
Посилання
A. R. Sangi, J. Liu, and L. Zou, “A performance analysis of AODV routing protocol under combined byzantine attacks in MANETs,” International Conference on Computational Intelligence and Software Engineering, pp. 1–5, 2009.
Метелёв А.П., Чистяков А.В., Жолобов А.Н. Протоколы муршрутизации в беспроводных самоорганизующихня сетях [Електронний ресурс] / Метельов А.П., Чистяков А.В. та інші. Режим доступу: https://cyberleninka.ru/article/v/protokoly-marshrutizatsii-v-besprovodnyh-samoorganizuyuschihsya-setyah.
Shashi Gurung, Siddhartha Chauhan A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network [Електронний ресурс] / Shashi Gurung, Siddhartha Chauhan Режим доступу: ieeexplore.ieee.org/document/8300186.
S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, “Prevention of cooperative black hole attack in wireless ad hoc net-works,” [Електронний ресурс] / S. Ramaswamy, H. Fu, M. Sreekantaradhya та інші Режим доступу: https://pdfs.semanticscholar.org/
eff7/532e9de97faa4d746b0f37997baf67f68879.pdf.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2018 Анастасія Віталіївна Вовк
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.