|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
The collaboration of all participating Nodes relies on the mobile ad hoc networks (MANETs). The more traffic nodes collaborate, the stronger a MANET is. However, MANET support is a cost-intensive mobile node operation. Roads and packets are detected by local CPUs and need time, memory, network bandwidth, and ultimately but not least energy. It is thus highly motivated that a node denies packet forwarding to others while simultaneously providing its own data utilizing their services. Data analyzes the various ways to conserve resources in a MANET using the DSR routing protocol for an ego node. It utilizes Bruce Schneider’s attack-tree rating which categorizes assaults, all of which lead an assailant to a particular objective.
Keyword
Co-Operative, Bait, Intrusion, Manet, Data
PDF Download (click here)
|
|
|
|
|