Thursday, April 15, 2010

detection protocol

Network Security is a fundamental prerequisite for network survivability and reliability in Ad hoc wireless network. However, the competitive and sharing wireless channel is vulnerable by Media Access Control (MAC) attacks from malicious nodes (wedding dresses form china), which disobey the rules of random access backoff algorithms, for the purpose of the unfair occupation of channel resource, blocking channel or selfish benefit enhancement. There have been some detection methods in literature, but the existing strategy has the problem that calculation overhead is too cheap nike shoes heavy , the detection accuracy and the detection rate is too low, and can’t cope with intelligent attack. This paper proposes a novel Central Limit Theorem (CLT) algorithm to detect MAC misbehaviors of malicious nodes, and design a detection protocol, CM-SEC(CLTMarkov-SECURITY) protocol, with the function of cooperating detection base on CLT algorithm.First, we have a introduce about the key technology in wedding dresses 2nd MAC (media access control ) protocol, summarize all sorts of attack behavior existing in hot women's dresses MAC, have a deep study about the detection and defending methods coping with shop 4u blog for shirts attack, and abstract the excellence and fault. In order to conquer the most difficult backoff attack misbehavior, we propose a novel detect and defeat algorithm-CLT algorithm.
http://www.chor.fora.pl
http://www.erelocationprofessionals.com/forum
http://www.ultimathule.nor.pl
http://www.setbb.com/tliao
http://www.fmnorge.com/forum

http://dailyamerican.messageforums.net
http://www.savotky.net/forum
http://cefresearch.com/phpBB2
http://www.intus.ehost.pl/forum
http://www.almsamim.com