Individual Security and Network Design with Malicious Nodes
Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. The decentralized nature of such protection is...
Main Authors: | Tomasz Janus, Mateusz Skomra, Marcin Dziubiński |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-08-01
|
Series: | Information |
Subjects: | |
Online Access: | http://www.mdpi.com/2078-2489/9/9/214 |
Similar Items
-
The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks
by: Sekgoari Semaka Mapunya, et al.
Published: (2019-12-01) -
Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithm
by: V. Chandrasekar, et al.
Published: (2024-04-01) -
Of Malicious Motes and Suspicious Sensors
by: Gilbert, Seth, et al.
Published: (2006) -
Comparative analysis of individual peculiarities for tennis players of different qualification
by: Y.O. Emshanova
Published: (2013-08-01) -
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)