The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.11591/ijeecs.v30.i3.pp1856-1865
|View full text |Cite
|
Sign up to set email alerts
|

Malicious attacks modelling: a prevention approach for ad hoc network security

Abstract: As a result of the expansions that have taken place in the field of networking and the increase in the number of users of networks, there have recently been breakthroughs made in the techniques and methods used for network security. In this paper, a virtual private network (VPN) is proposed as a means of providing the necessary level of security for particular connections that span across vast networks. After the network performance metrics such as time delay and throughput have been accomplished, the suggeste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 55 publications
0
0
0
Order By: Relevance
“…In [7], a virtual version of a separate secure network based on the use of a VPN gateway is proposed as a means of ensuring the necessary level of security for specific connections that cover large networks. The main indicator for evaluating the efficiency of data transmission in the cited work is the time delay and throughput of data packets through a secure channel.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…In [7], a virtual version of a separate secure network based on the use of a VPN gateway is proposed as a means of ensuring the necessary level of security for specific connections that cover large networks. The main indicator for evaluating the efficiency of data transmission in the cited work is the time delay and throughput of data packets through a secure channel.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…In a network pair, a malicious node sends the target node a number of requests, and the target node tries to answer to each one. The target's high request volume lengthens the wait and gives the impression that it is busy (8,9) . This can impede the target from properly responding to legitimate requests or processing them.…”
Section: Introductionmentioning
confidence: 99%