This book is beneficial for those researchers who are working on Network Security specially in Wireless Ad-Hoc Sensor Network. In Wireless Ad-Hoc Sensor Network concern, there are various types of attacks one of them is Vampire Attack. Wireless sensor network is vulnerable to Denial of Service attack (DoS). DoS attack makes resources blocked and not available to users. This Denial of service attack is creating suitable condition for Vampire attack and makes main cause for it. In Vampire attack it makes the node to consume more battery power and degrades the network performance. Vampire attack does not rely on any particular type of routing protocol. There are so many techniques discovered to find such kind of attacks but each has pros and cons. In this technique use the EWMA. In this calculate the energy consumption of the each node in the network. Trust value of each node is calculated for the routing. The node having low energy consumption and high trust value is selected for the routing.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book is beneficial for those researchers who are working on Network Security specially in Wireless Ad-Hoc Sensor Network. In Wireless Ad-Hoc Sensor Network concern, there are various types of attacks one of them is Vampire Attack. Wireless sensor network is vulnerable to Denial of Service attack (DoS). DoS attack makes resources blocked and not available to users. This Denial of service attack is creating suitable condition for Vampire attack and makes main cause for it. In Vampire attack it makes the node to consume more battery power and degrades the network performance. Vampire attack does not rely on any particular type of routing protocol. There are so many techniques discovered to find such kind of attacks but each has pros and cons. In this technique use the EWMA. In this calculate the energy consumption of the each node in the network. Trust value of each node is calculated for the routing. The node having low energy consumption and high trust value is selected for the routing. 68 pp. Englisch. N° de réf. du vendeur 9783330015333
Quantité disponible : 2 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 68 pages. 8.66x5.91x0.16 inches. In Stock. N° de réf. du vendeur 3330015330
Quantité disponible : 1 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Patil Jitendra RanjitsinghJitendra R. Patil done M.Tech in CS from SVCE,Indore affiliated to R.G.T.U,Bhopal (M.P), done B.E in I.T. from R. C. Patel Institute of Technology, Shirpur, affiliated to N.M.U, Jalgoan (M.S). Life member of. N° de réf. du vendeur 158852982
Quantité disponible : Plus de 20 disponibles
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book is beneficial for those researchers who are working on Network Security specially in Wireless Ad-Hoc Sensor Network. In Wireless Ad-Hoc Sensor Network concern, there are various types of attacks one of them is Vampire Attack. Wireless sensor network is vulnerable to Denial of Service attack (DoS). DoS attack makes resources blocked and not available to users. This Denial of service attack is creating suitable condition for Vampire attack and makes main cause for it. In Vampire attack it makes the node to consume more battery power and degrades the network performance. Vampire attack does not rely on any particular type of routing protocol. There are so many techniques discovered to find such kind of attacks but each has pros and cons. In this technique use the EWMA. In this calculate the energy consumption of the each node in the network. Trust value of each node is calculated for the routing. The node having low energy consumption and high trust value is selected for the routing.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 68 pp. Englisch. N° de réf. du vendeur 9783330015333
Quantité disponible : 1 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book is beneficial for those researchers who are working on Network Security specially in Wireless Ad-Hoc Sensor Network. In Wireless Ad-Hoc Sensor Network concern, there are various types of attacks one of them is Vampire Attack. Wireless sensor network is vulnerable to Denial of Service attack (DoS). DoS attack makes resources blocked and not available to users. This Denial of service attack is creating suitable condition for Vampire attack and makes main cause for it. In Vampire attack it makes the node to consume more battery power and degrades the network performance. Vampire attack does not rely on any particular type of routing protocol. There are so many techniques discovered to find such kind of attacks but each has pros and cons. In this technique use the EWMA. In this calculate the energy consumption of the each node in the network. Trust value of each node is calculated for the routing. The node having low energy consumption and high trust value is selected for the routing. N° de réf. du vendeur 9783330015333
Quantité disponible : 1 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. Reducing Energy Consumption Mechanism for Detection of Vampire Attack | Jitendra Ranjitsingh Patil (u. a.) | Taschenbuch | 68 S. | Englisch | 2016 | LAP LAMBERT Academic Publishing | EAN 9783330015333 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. N° de réf. du vendeur 108100778
Quantité disponible : 5 disponible(s)