Gotowa bibliografia na temat „Grey Hole Attack”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Grey Hole Attack”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Grey Hole Attack"

1

Kaur, Rupinder, and Parminder Singh. "Review of Black Hole and Grey Hole Attack." International journal of Multimedia & Its Applications 6, no. 6 (2014): 35–45. http://dx.doi.org/10.5121/ijma.2014.6603.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

K., T. Gowdhami, and Nithya D. "DESIGN AND ANALYSIS OF SECURE VANET FRAMEWORK PREVENTING SINK HOLE AND GRAY HOLE ATTACK." International Journal of Advanced Trends in Engineering and Technology 2, no. 1 (2017): 55–59. https://doi.org/10.5281/zenodo.495747.

Pełny tekst źródła
Streszczenie:
Vehicular Networks are considered as novel class of wireless networks, also called as VANET (Vehicular ad-hoc Networks). It is a key component of Intelligent Transport System (ITS). VANET technology is identified for improving road safety and transport efficiency. However, due to recent arise in security issues in VANET, VANETs must have a secure way for communication which is quite challenging and vital issue. This paper scrutinized the effects of packet loss in the network due to Sink Hole attack and Grey Hole Attack and also propositions a detection technique that competently detects both a
Style APA, Harvard, Vancouver, ISO itp.
3

C, Gowdham, and Dr Parvatham Vijay N. "Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 12, no. 8 (2020): 104–15. http://dx.doi.org/10.5373/jardcs/v12i8/20202452.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Dr., Srinivas Ambala* Dr. Ravi Kumar Yeatha. "ANALYSIS AND REVIEW ON VARIOUS SECURITY ISSUES AND THEIR PREVENTION TECHNIQUES IN THE AD-HOC SENSOR NETWORKS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 2 (2017): 309–14. https://doi.org/10.5281/zenodo.290263.

Pełny tekst źródła
Streszczenie:
Ad-hoc Sensor Networks (ASN) is the most demanded and happening research area now a day. Here mainly the security is important issue in ASN. The following paper describes process of communication in MANET, Security issues, Black hole attack, and Intrusion detection. In the mobile ad-hoc network the nodes keep travelling in its surrounded environment. In the process of data communication from source to destination the intermediate nodes plays important role. We know that MANET is most demanded and useful because of its decentralized and wireless infrastructre.Due to this nature it also faces so
Style APA, Harvard, Vancouver, ISO itp.
5

Jasvir, Markandy1 Manmohan Sharma2. "DIMINISH THE FLOODING ATTACK USING MUTUAL AUTHENTICATION IN MOBILE AD-HOC NETWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 5 (2018): 24–30. https://doi.org/10.5281/zenodo.1241365.

Pełny tekst źródła
Streszczenie:
Mobile ad-hoc network (MANET) is a group of wireless mobile nodes and dedicated routers used by base station. MANET application in mobility management, broad casting, and bandwidth management are important issue in routing and information gathering<strong>. </strong>In MANET, Different types of attack has been developed today which degrade the performance of network and makes it less efficient like SYN flooding, Black hole attack,Worm hole attack, Grey hole attack etc.In this paper, we are representing flooding attack proposed by various author inmobile ad-hoc network.
Style APA, Harvard, Vancouver, ISO itp.
6

J, Viji Gripsy, Jayanthiladevi A, Mahendiran N, and Sheela Rini A. "SRDAODV: A Hybrid Secure Routing Protocol for Mobile Ad-Hoc Networks." Indian Journal of Science and Technology 16, no. 32 (2023): 2574–79. https://doi.org/10.17485/IJST/v16i32.1240.

Pełny tekst źródła
Streszczenie:
Abstract <strong>Objectives:</strong>&nbsp;To counteract grey hole and black hole attacks, the proposed method deploys a hybrid framework along with the Ad hoc on-demand distance vector (AODV) routing protocol. A modified protocol is called as SRDAODV (Secure Route Discovery-Adhoc On-Demand Distance Vector).&nbsp;<strong>Methods:</strong>&nbsp;The proposed work establishes secure route from secure node discovery, which protects from sequential attacks. The proposed framework has three significant components Node Authentication, Secure Neighbor discovery and route establishment, and Node Isolat
Style APA, Harvard, Vancouver, ISO itp.
7

K., Thamizhmaran. "Effective Communication in Infrastructure less Wireless Network using PQ Scheduling Algorithm." Journal of Optoelectronics and Communication 5, no. 3 (2023): 33–39. https://doi.org/10.5281/zenodo.10088679.

Pełny tekst źródła
Streszczenie:
<i>The use of wireless sensor networks (WSNs) in applications that are crucial to security is growing. They are vulnerable to a variety of security attacks due to their innate resource constraints, and one particular kind of attack that has a significant negative impact on data collecting is the grey-hole attack. Active Trust (AT), a security and trust routing mechanism based on active detection, is suggested for WSNs as a solution to that problem. The main novelty of Active Trust is that it improves the data route security in priority queuing in scheduling algorithm utilizing NS2 Simulator by
Style APA, Harvard, Vancouver, ISO itp.
8

Geete, Kanu, Piyush Kumar Shukla, and Anjana Jayant Deen. "A Survey on Grey Hole Attack in Wireless mesh Networks." International Journal of Computer Applications 95, no. 23 (2014): 23–29. http://dx.doi.org/10.5120/16736-7019.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Shiranzaei, Atena, and Farhad Khoshbakht. "A Novel Detection Method for Grey Hole Attack in RPL." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (2023): 492–97. http://dx.doi.org/10.17762/ijritcc.v11i7s.7027.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) is a type of network that involves the Internet and things. This network consists of constrained devices that are connected through an IP protocol. In the IoT, a network with constrained devices is called 6LowPAN. RPL is a routing protocol to address the constraints and specific properties of these networks; though RPL puts the networks at risk through a large variety of attacks. The urgent need to develop secure routing solutions is required. In this paper, we investigated grey hole attacks and presented a detection method to identify and isolate the malicious nod
Style APA, Harvard, Vancouver, ISO itp.
10

K., Thamizhmaran. "SCHEDULING ALGORITHM IN INFRASTRUCTURELESS NETWORK." Journal of Emerging Trends in Electrical Engineering 5, no. 3 (2023): 16–19. https://doi.org/10.5281/zenodo.10147509.

Pełny tekst źródła
Streszczenie:
<i>Some of recent researchers interested in the field of sensor network based&nbsp;wireless field (WSN) because of very difficult to communication via air medium due to lack of problems in using same carrier channel in all communication and easy to attack for security issues like malicious attacks or misbehavioue attacks, Grey hole attacks, block hole attacks, etc. In truest based path not easy to fine this drawbacks overcome we proposed and implement one type of scheduling algorithm called shortest first job with help of infrastructure less network. This leading algorithm is overcome above is
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Grey Hole Attack"

1

Hsieh, Yi-Ting, and 謝易廷. "Detection of Gray Hole attack in Software Define Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/868sjw.

Pełny tekst źródła
Streszczenie:
碩士<br>國立交通大學<br>資訊管理研究所<br>106<br>Gray hole attack is an advanced type of black hole attack. Both of them are a common attack in Wireless network. It easily happens in specific protocol like AODV, DSR. Malicious nodes can selectively or randomly drop packets. It reduce the efficiency of the network. Software Define Network has been highly developed in recent years. It’s a new type of network that separate the control plane and data plane. User can build his own network according to his preferences. Network protocol and packet filed are also programmable. Because the switch separates the contro
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Grey Hole Attack"

1

Kennedy, Thomas C. Quakers. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199683710.003.0004.

Pełny tekst źródła
Streszczenie:
Unitarianism and Presbyterian Dissent had a complex relationship in the nineteenth century. Neither English Unitarians nor their Presbyterian cousins grew much if at all in the nineteenth century, but elsewhere in the United Kingdom the picture was different. While Unitarians failed to prosper, Presbyterian Dissenting numbers held up in Wales and Ireland and increased in Scotland thanks to the Disruption of the Church of Scotland. Unitarians were never sure whether they would benefit from demarcating themselves from Presbyterians as a denomination. Though they formed the British and Foreign Un
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Grey Hole Attack"

1

Musale, Sandeep S., Sandeep L. Dhende, S. D. Shirbahadurkar, and Anand S. Najan. "Gray Hole and Cooperative Attack Prevention Protocol for MANETs." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1501-5_49.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Liu, Dezhi, and Zhen Guo. "A Lightweight Detection Scheme for the Black-Hole Attacks and Gray-Hole Attacks in VANETs." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-1548-3_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Geetanjali Rathee and Hemraj Saini. "Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network." In Proceedings of the International Congress on Information and Communication Technology. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0755-2_41.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Rao, Sunil Poyyagadde, Deepak Devaru Joshi, and Juzi Zhao. "Machine Learning Based Detection of Gray-Hole Attack in Mobile Ad-Hoc Networks." In 3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44372-6_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chawla, Priya, and Monika Sachdeva. "Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks." In Advances in Intelligent Systems and Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6005-2_41.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Doshi, Chintan Ketankumar, Sreecharan Sankaranarayanan, Vidyashankar B. Lakshman, and K. Chandrasekaran. "Game Theoretic Modeling of Gray Hole Attacks in Wireless Ad Hoc Networks." In Lecture Notes in Electrical Engineering. Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-3592-7_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Deepali Virmani and Pranav Gupta. "Adaptive Exponential Trust-Based Algorithm in Wireless Sensor Network to Detect Black Hole and Gray Hole Attacks." In Emerging Research in Computing, Information, Communication and Applications. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0287-8_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Neha, Gurjot Kaur Walia, and Harminder Kaur. "A Cipher Based Acknowledgement Approach for Securing MANETs by Mitigating Black and Gray Hole Attacks." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0755-3_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Kurtkoti, Mahesh, B. S. Premananda, and K. Vishwavardhan Reddy. "Performance Analysis of Machine Learning Algorithms in Detecting and Mitigating Black and Gray Hole Attacks." In Innovative Data Communication Technologies and Application. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7167-8_69.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Selvik, Kjetil, and Jacob Høigilt. "National Security and Free Speech in Tunisia." In Journalism in the Grey Zone. Edinburgh University Press, 2023. http://dx.doi.org/10.3366/edinburgh/9781399515818.003.0006.

Pełny tekst źródła
Streszczenie:
Chapters 6-8 interrogate how journalists react when critical features of democracy are at stake and the first issue is the balancing of national security and civil liberties. Tunisia and Lebanon face real and home-grown problems of violent extremism, but security is also evoked to justify infringements on citizen rights. The chapter discusses how Tunisian journalists handled the tension between a heightened sense of insecurity and the country’s frail democratic opening in the wake of the 2015 terrorist attack at the Bardo Museum. It shows that prominent commentators fell back on interpretive s
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Grey Hole Attack"

1

Mohapata, Soumya Ranjan, Rekha Jain, Srinivas Koushik K, Sandeep Varma Kalidindi, and Umashankar Ghugar. "TBNDG: Trust-Based Malicious Node Detection for Grey-Hole Attacks in VANET’s." In 2024 Eighth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2024. https://doi.org/10.1109/pdgc64653.2024.10984014.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Vimalnath, S., R. Midhun, A. S. Kavinesh, P. Karvendan, and K. Kishore. "Enhanced Security Framework for Gray-Hole Attack Prevention in Vehicular Networks." In 2025 International Conference on Visual Analytics and Data Visualization (ICVADV). IEEE, 2025. https://doi.org/10.1109/icvadv63329.2025.10961129.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

M, Arunkumar, Janaranjani M, and Pavithra K. "A Proactive Approach for Securing VANETs Against Gray-Hole Attacks." In 2025 3rd International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC). IEEE, 2025. https://doi.org/10.1109/isacc65211.2025.10969306.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Nagalakshmi, T. J., and R. Samar Kumar. "Comparative Analysis of Random Forest and Decision Tree for Gray Hole Attack Detection in Wireless Ad Hoc Networks." In 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE). IEEE, 2024. http://dx.doi.org/10.1109/icspcre62303.2024.10675140.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kanaparthi, Venkata Murali Mohan, and Krishna Vempati. "Grey hole attack in mobile ad-hoc network mitigation and protection." In WOMEN IN PHYSICS: 7th IUPAP International Conference on Women in Physics. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0181902.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kumar, R. Samar, and T. J. Nagalakshmi. "Design of intrusion detection system in the detection of grey hole attack in wireless ad hoc network using K-means cluster comparing with decision tree." In FIFTH INTERNATIONAL CONFERENCE ON APPLIED SCIENCES: ICAS2023. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0197407.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Patil, Sarika U. "Gray hole attack detection in MANETs." In 2017 2nd International Conference for Convergence in Technology (I2CT). IEEE, 2017. http://dx.doi.org/10.1109/i2ct.2017.8226087.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Verma, Swati, Bhawna Mallick, and Poonam Verma. "Impact of gray hole attack in VANET." In 2015 1st International Conference on Next Generation Computing Technologies (NGCT). IEEE, 2015. http://dx.doi.org/10.1109/ngct.2015.7375097.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Chadha, Kriti, and Sushma Jain. "Impact of black hole and gray hole attack in AODV protocol." In 2014 Recent Advances and Innovations in Engineering (ICRAIE). IEEE, 2014. http://dx.doi.org/10.1109/icraie.2014.6909188.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Dhende, Sandeep, Sandeep Musale, Suresh Shirbahadurkar, and Anand Najan. "SAODV: Black hole and gray hole attack detection protocol in MANETs." In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2017. http://dx.doi.org/10.1109/wispnet.2017.8300188.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!