1.   مشاوره و انجام پروپوزال  و پایان نامه ، مشاوره در زمینه ارائه سمینار، 
       مشاوره و انجام مقاله های بین المللی و داخلی، 
       مشاوره و انجام مقاله در مجله های علمی پژوهشی معتبر، 
        مشاوره و آموزش شبیه سازی شبکه توسط شبیه ساز آکادمیک 2-NS، 
         مشاوره و آموزش شبیه سازهای ترافیک شهری از قبیل  SUMO، ONE، و ...
          کمک به دانشجویان برای پیاده سازی ایده ها و مقالات خود با شبیه سازهای
               NS2, NS3 , OMNET++ , ONE
     
    
                 شماره تماس :
                         حسین رنجبران:    09101607834   
                                          
    
                  ساعات تماس: 
                                      ۸ الی ۲۰
                         
                   ایمیل:
                         hossein.ranjbaran.it@gmail.com
                        
           
    

An Improved Wormhole Attack Detection and Prevention Method for Wireless Mesh Networks

شروع موضوع توسط AdMiN ‏28/2/16 در انجمن امنیت و الگوریتم های امنیتی

وضعیت موضوع:
You must be a logged-in, registered member of this site to view further posts in this thread.
  1. AdMiN

    AdMiN Administrator هیات مدیره

    Abstract: In the wireless mesh networks, the key role is played by the routers thus most of security threats are occurred to breach routing functionalities. Therefore, number of different kinds of attacks are deployed in networks easily i.e. Black-hole, Wormhole, Gray-hole and many others. Most of the attacks are deployed in order to degrade the performance of overall networks or bypass the network traffic. Therefore the presented work is aimed to explore the issues and challenges to design a secure network communication for wireless mesh network. One of them is wormhole attack i.e. severe kind of security threats in WMN. The proposed work is locates the wormhole link in network and tries to recover the network performance during the attack conditions. Thus, the scheme detects the malevolent nodes and prevents formation of wormholes. The Proposed mechanism based on two phase solution. In first phase the threshold value is computed using the different routing scenarios, the threshold value usage the network transmission delay in network and in second phase the threshold value is used to identify the malevolent link in the network. The implementation of the proposed concept is provided using the Ad-hoc on Demand Distance Vector routing protocol modification in network simulator 2 i.e. NS-2.​

    لینک دانلود در پست بعد برای اعضاء قابل مشاهده است.
     
وضعیت موضوع:
You must be a logged-in, registered member of this site to view further posts in this thread.

این صفحه را به اشتراک بگذارید