Please use this identifier to cite or link to this item:
https://dspace.univ-ouargla.dz/jspui/handle/123456789/7831
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Amara korba Abdelaziz, Mehdi Nafaa | - |
dc.contributor.author | Ghanemi Salim | - |
dc.date.accessioned | 2014-11-18T14:07:20Z | - |
dc.date.available | 2014-11-18T14:07:20Z | - |
dc.date.issued | 2014-11-18 | - |
dc.identifier.issn | dmz | - |
dc.identifier.uri | http://dspace.univ-ouargla.dz/jspui/handle/123456789/7831 | - |
dc.description | 2émes journées internationales de chimie organométallique et catalyse jicoc’2014 | en_US |
dc.description.abstract | An ad hoc network is a collection of mobile devices that communicate in a self-organized way using wireless network interfaces without neither centralized administration nor fixed infrastructure. In such a network, nodes must cooperate with each other so as to extend their transmission range to reach distant nodes. This cooperation requires a specific ad hoc routing protocol to establish and maintain routes between nodes. Ad hoc routing protocols are based on mutual trust between collaborating nodes and suppose a correct behavior. As a result, these networks are particularly vulnerable to various security threats. , and therefore, security is a more significant issue than infrastructure-based wireless networks. In this paper, we present security analysis of the Ad hoc On-demand Distance Vector (AODV) routing protocol to identify all possible security threats that can target its algorithm, such as resources depletion, blackhole, wormhole and rushing attacks. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | 2014; | - |
dc.subject | MANET | en_US |
dc.subject | AODV | en_US |
dc.subject | security attacks | en_US |
dc.subject | malicious node | en_US |
dc.title | Analysis of Security Attacks In AODV | en_US |
dc.type | Article | en_US |
Appears in Collections: | 1. Faculté des mathématiques et des sciences de la matière |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
icaiit2014_submission_27.pdf | 345,75 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.