Enviar pesquisa
Carregar
50120140507006
•
0 gostou
•
202 visualizações
IAEME Publication
Seguir
50120140507006
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 5
Baixar agora
Baixar para ler offline
Recomendados
Intrusion detection in MANETS
Intrusion detection in MANETS
Pooja Kundu
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
IJMER
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
International Journal of Technical Research & Application
Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.ppt
slksagar
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
Bhavani Testone
eaack-a secure ids for manet
eaack-a secure ids for manet
Aswin Pv
Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...
Kumar Dlk
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
eSAT Journals
Recomendados
Intrusion detection in MANETS
Intrusion detection in MANETS
Pooja Kundu
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
IJMER
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
International Journal of Technical Research & Application
Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.ppt
slksagar
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
Bhavani Testone
eaack-a secure ids for manet
eaack-a secure ids for manet
Aswin Pv
Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...
Kumar Dlk
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
eSAT Journals
EAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System Overview
vpmmguys
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
AM Publications
“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
Attacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A Survey
IJERA Editor
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
IJNSA Journal
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
CSCJournals
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
IJERA Editor
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET Journal
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET Journal
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
IJLT EMAS
Serial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
iosrjce
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
iosrjce
E42043640
E42043640
IJERA Editor
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
IJERA Editor
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
theijes
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
IRJET Journal
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
Lim Jung
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
Agenda
Agenda
Siemprefm Cientouno Punto Cinco
Winter in Greece.
Winter in Greece.
Nikos
[Mercado Pecuário] Principais notícias - 12/12/11
[Mercado Pecuário] Principais notícias - 12/12/11
AgroTalento
Mais conteúdo relacionado
Mais procurados
EAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System Overview
vpmmguys
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
AM Publications
“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
Attacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A Survey
IJERA Editor
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
IJNSA Journal
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
CSCJournals
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
IJERA Editor
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET Journal
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET Journal
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
IJLT EMAS
Serial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
iosrjce
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
iosrjce
E42043640
E42043640
IJERA Editor
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
IJERA Editor
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
theijes
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
IRJET Journal
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
Lim Jung
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
Mais procurados
(19)
EAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System Overview
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
“Reducing packet loss in manet”
“Reducing packet loss in manet”
Attacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A Survey
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Serial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
E42043640
E42043640
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
Destaque
Agenda
Agenda
Siemprefm Cientouno Punto Cinco
Winter in Greece.
Winter in Greece.
Nikos
[Mercado Pecuário] Principais notícias - 12/12/11
[Mercado Pecuário] Principais notícias - 12/12/11
AgroTalento
Ensayo del curso de redes
Ensayo del curso de redes
Jivan Prado Sanchez
OpenERP Preventive maintenance
OpenERP Preventive maintenance
Avanzosc, S.L.
Beautiful sunsets. 4
Beautiful sunsets. 4
Nikos
Lalimentacidelsanimals 090520050257-phpapp02
Lalimentacidelsanimals 090520050257-phpapp02
aulaprimerb
Bronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacion
Bronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacion
Javier González de Dios
Web 04
Web 04
XMLProJ2014
Adviento 2011
Adviento 2011
xaquintana
[Mercado Pecuário] Principais Notícias 16-dez-2011
[Mercado Pecuário] Principais Notícias 16-dez-2011
AgroTalento
255 274 - relatório final inquérito
255 274 - relatório final inquérito
Roberto Rabat Chame
Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012
Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012
IAB Netherlands
Granxas e adegas monasticas_sobrado
Granxas e adegas monasticas_sobrado
MUSEO ETNOLOXICO
La lluna gonzalo
La lluna gonzalo
Txema Gs
Redes Sociales - RS0610
Redes Sociales - RS0610
miguelabrilg9
Afip
Afip
Siemprefm Cientouno Punto Cinco
Afip
Afip
Siemprefm Cientouno Punto Cinco
Digital Rhetoric, October 21, 2014
Digital Rhetoric, October 21, 2014
Miami University
Observam la nostra llengua
Observam la nostra llengua
aulaprimerb
Destaque
(20)
Agenda
Agenda
Winter in Greece.
Winter in Greece.
[Mercado Pecuário] Principais notícias - 12/12/11
[Mercado Pecuário] Principais notícias - 12/12/11
Ensayo del curso de redes
Ensayo del curso de redes
OpenERP Preventive maintenance
OpenERP Preventive maintenance
Beautiful sunsets. 4
Beautiful sunsets. 4
Lalimentacidelsanimals 090520050257-phpapp02
Lalimentacidelsanimals 090520050257-phpapp02
Bronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacion
Bronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacion
Web 04
Web 04
Adviento 2011
Adviento 2011
[Mercado Pecuário] Principais Notícias 16-dez-2011
[Mercado Pecuário] Principais Notícias 16-dez-2011
255 274 - relatório final inquérito
255 274 - relatório final inquérito
Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012
Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012
Granxas e adegas monasticas_sobrado
Granxas e adegas monasticas_sobrado
La lluna gonzalo
La lluna gonzalo
Redes Sociales - RS0610
Redes Sociales - RS0610
Afip
Afip
Afip
Afip
Digital Rhetoric, October 21, 2014
Digital Rhetoric, October 21, 2014
Observam la nostra llengua
Observam la nostra llengua
Semelhante a 50120140507006
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
ijceronline
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
eSAT Publishing House
50120140504011
50120140504011
IAEME Publication
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc network
graphhoc
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
ijctet
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
Fransiskeran
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
International journal of scientific and technical research in engineering (IJSTRE)
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
cscpconf
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
IAEME Publication
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2
JPINFOTECH JAYAPRAKASH
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
JPINFOTECH JAYAPRAKASH
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
Preventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In Manet
IOSR Journals
B010120913
B010120913
IOSR Journals
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
cscpconf
Semelhante a 50120140507006
(20)
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
50120140504011
50120140504011
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc network
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
Preventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In Manet
B010120913
B010120913
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
Mais de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Mais de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Último
(20)
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
50120140507006
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E HYBRID CRYPTOGRAPHY ALGORITHMS FOR SECURE EAACK IN MANET Swati R. Salunke, Prof. S. Pratap Singh Student Professor 43 ABSTRACT Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes along with wireless transmitter and receiver that with each other via a bi-directional links either directly or indirectly. A new intrusion detection system named communicates Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. It is based on the digital signature algorithm (DSA). To enhance the security in the mobile adhoc networks, we introduce a new approach called Hybrid cryptography algorithm that provides integrity, confidentiality and authentication. This hybrid cryptography algorithm is based on two cryptography algorithms such as RSA and AES. Encryption is achieved by using, RSA algorithm for authentication and symmetric algorithm for the integrity. By using the symmetric and asymmetric cryptographic algorithm, we can achieve better security and integrity than the EAACK. Index Terms: AES, Digital Signature Algorithm (DSA), Enhanced Acknowledgment (EAACK), Mobile Adhoc Network (MANET), RSA. I. INTRODUCTION Now a days wireless network has much more preferences than the wired network due to the mobility and scalability nature of wireless network made it possible in many applications. All the contemporary wireless networks, Mobile Ad hoc Network is one of the most important and unique applications. MANET is a collation of independent nodes along with transmitter and the receiver that can directly communicate with each other via a bidirectional link. MANET does not require a fixed infrastructure. MANET is a self-configuring network that is formed automatically by a collection of mobile nodes without the help of a centralized management. Each node is equipped with a wireless
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME transmitter and receiver, which allow it to communicate with other nodes in its radio communication range. In order for a node to forward a packet to a node that is out of its radio range, the cooperation of other nodes in the network is needed, this is known as multi-hop communication. Therefore in MANET each node acts as both a host and a router at the same time. MANET consists of two types i.e. single hop and multi hop [1]. In single hop MANET all node are present in a same communication range and they can directly communicate with each other and in multihop, where several intermediate nodes relay the packets sent by the source node before they reach the destination node. But due to the open nature of the MANET it is vulnerable to the various types of attacks. To prevent from the malicious attacks on the MANET a new scheme is introduce i.e. Intrusion Detection System (IDS). 44 II. RELATED WORK Each node in MANETs assumes that other nodes always work together with each other to relay data. Due to the open nature of the MANET attackers get the significant impact on the network with just one or two compromised nodes. To eliminate the potential damages caused by compromised address this problem, Intrusion Detection System (IDS) [2] should be added to enhance the security level of the MANETs. If MANET can detect the attackers as soon as they enter in to the network and IDS acts as a second layer in a MANETs. IDS consist of three approaches such as Watchdog, TWOACK and AACK. The watchdog scheme is proposed by the Marti et al. [3]. It consists of two parts, namely Watchdog and Path rates. Watchdog serves as an intrusion detection system for MANETs. It is responsible for detecting malicious nodes in the network. Watchdog detects malicious is behavior by promiscuously listens to its next hops transmission. If Watchdog node overhears that its next node fails to forward the packet within a certain period of time, it increases its failure counter. If the nodes are not successes in a predefined threshold, the watchdog node reports it as misbehaving. In this case, the Path rater cooperates with the routing protocols to avoid the reported nodes in future transmission. But Watchdog faces many problems such as receiver collision, partial dropping, limited transmission power, false misbehavior report, ambiguous collisions. TWOACK scheme is proposed by Liu et al [4]. TWOACK is neither an agreeable nor a Watchdog based scheme. It is able to solve the receiver collision and limited transmission power problem of Watchdog. TWOACK finding misbehaving links by acknowledging every data packets transmitted over each one after the other three nodes along the path from the source to destination. And the third, Adaptive ACKnowledgement (AACK) new scheme proposed by Sheltami et al. [5]. AACK is based on the TWOACK, which provides an end to end acknowledgement scheme called ACK. As compared to TWOACK, AACK significantly reduced network overhead while still capable of maintaining or surpassing the same network throughput [8]. III. EXISTING SYSTEM EAACK is a new acknowledgement based scheme. EAACK removes all six weakness of the Watchdog scheme. The Digital Signature Algorithm (DSA) is to prevent the attacker from forging acknowledgement packets. EAACK is consisted of three major parts, namely, ACK, S-ACK (Secure ACK) and MRA (Misbehavior Report Authentication) [1]. ACK is basically end to end acknowledgement scheme. In ACK mode, node S first sends out an ACK data packet to the destination node D. IF all the intermediate nodes along the route between nodes source S to destination D node are cooperate with each other and node D successfully receives a packet send by sending a Secure ACK (S-ACK) data packet to detect the misbehaving nodes in the route.
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME ACK is basically end to end acknowledgement scheme. In ACK mode, node S first sends out an ACK data packet to the destination node D. IF all the intermediate nodes along the route between nodes source S to destination D node are cooperate with each other and node D successfully receives a packet send by sending a Secure ACK (S-ACK) data packet to detect the misbehaving nodes in the route. Secure-ACK is a improved version of ACK scheme proposed by Liu et al [6]. In the S-ACK scheme to detect the misbehaving nodes every three successive nodes work in a group. In the three successive nodes the S-ACK acknowledgement packet is sent by the third node to the first node. This S-ACK scheme is able to detect the misbehaving nodes in a MANET along with the receiver collision and low transmission power. In watchdog scheme, it fails to detect the misbehaving node due to the presence of a false misbehavior report. Because of this false report information the Watchdog reports a normal node as malicious node. To overcome this drawback of the watchdog MRA (Misbehavior Report Authentication) scheme is used. MRA scheme is to authenticate whether the destination node has received the reported missing packet through a different route. For this the source node seeks its local knowledge base and identifies the other route to the destination node. If there is no route to the destination by using the DSR routing request to find the alternate route. Where the MRA packet is received by the destination node, it compares with using the local knowledge base whether the reported packet was received or not. If already received it make a decision, and it is a false misbehavior report. In EAACK, Digital Signature is used to prevent the attackers from acknowledgment packets. The three schemes of the EAACK are ACK, S-ACK and MRA are acknowledgement based detection systems. To detect the misbehaviors in the network, this all three schemes are relay on the acknowledgement packets. All acknowledgement packets in the EAACK are authentic. Otherwise the attackers will give the false acknowledgement; all three schemes are susceptible. So, the digital signature in EACCK to ensure the integrity of the intrusion detection system [7]. It requires all acknowledgment packets to be digitally signed before they are sent out and verified until they are accepted. But it requires additional resources due to the digital signature in mobile adhoc network. 45 IV. PROPOSED WORK In EAACK scheme we use a digital signature algorithm for to ensure the integrity of the intrusion detection system. In EAACK scheme all acknowledgement packets to be digitally signed before they are sent out and verified until they accepted [9]. If attackers are able to send the false acknowledgement packets, all of the schemes of EAACK are vulenerable and existing system cannot able to reduce the network overhead caused by digital signature. To enhance the security in the MANET, we introduce a new approach called Hybrid Cryptography algorithm that provides integrity, confidentiality and authentication. Our proposed system, hybrid cryptography algorithms consists of symmetric and asymmetric algorithm. The public key cryptography is also known as asymmetric cryptography, which means requires two separates keys such as private (secret) key and another is public key. In symmetric algorithm, there is only one key which is used for both encryption and decryption. In our system we use the symmetric algorithm, AES used for encryption of data and generate AES key for encryption. The symmetric cryptography techniques are used to achieve both the confidentiality and integrity in our system. The asymmetric algorithm, RSA is used for encryption of symmetric AES key. The public cryptography is used to achieve secure authentication in our system.
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME 46 V. EXPERIMENTAL RESULTS Packet Delivery Ratio (PDR) is a ratio of the number of packets received by the destination node to the number of packets sent by the source node .The graph of packet Delivery Ratio shown in figure in which PDR ranging from 0 to 1 is taken along y-axis and malicious nodes are taken on the x-axis. We can infer as the number of malicious nodes are decreases then the PDR will increases. Among the two response mechanisms, we also notice the packets delivery ratio of hybrid cryptography of EAACK response is higher than those of other approach EAACK (DSA and RSA). VI. CONCLUSION To increase the security level in the mobile ad hoc networks, we use a intrusion detection system called as EAACK. Along with the Digital signature algorithm in EAACK is to prevent the attackers from forged acknowledgement attacks. In the EAACK all the packets are digitally signed before they send out and verified after they are accepted. But the DSA in EAACK consumes more resources and also the security level will decrease. To enhance the security level and increase the integrity, confidentiality and authentication we use a hybrid cryptography algorithm. In our system, hybrid cryptography techniques consist of RSA and AES algorithm. REFERENCES [1] Elhladi M. Shakshuki, Nan Kang and Tarek R. Sheltami, EAACK A Secure Intrusion-Detection System for MANETs, in IEEE Transactions on Industrial Electronics, vol. 60, NO. 3, MARCH 2013. [2] B. Sun Intrusion detection in mobile ad hoc networks, Texas AM Univ., College Station, TX, 2004. [3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in Proc. 6th Annu. Int. Conf. Mobile Comput, Net. boston, MA, 2000, pp. 255-265. [4] R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-key Cryptosystems. In the Communications of ACM, vol. 20, pp 120-126, 1978. [5] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis. Secure Routing and Intrusion Detection in Ad hoc Networks, In the Proceedings of 3rd International Conference on Pervasive Computing and Communication, pp. 191-199, 2005. [6] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, Video transmission enhancement in presence of misbehaving nodes in MANETs Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273-282, Oct. 2009. [7] N. Kang, E. Shakshuki , and T. Sheltami , Detecting misbehaving nodes in MANETs, in Proc. 12th Int. Conf. ii WAS, Paris, France, Nov. 8-10,2010, pp. 216-222.
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME [8] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, Video transmission enhancement in presence of misbehaving nodes in MANETs Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273-282, Oct. 2009. [9] Swati R. Salunke, S. Pratap Singh, EAACK- Intrusion Detection System for MANET, National Conf. on Computer Engineering PG Conference, Pune. pp. 724, april 2014. [10] Shah Vrutik, Dr.Nilesh Modi and Patani Ashwin, “AODVGAP-An Acknowledgment Based Approach To Mitigate Selective Forwarding Attacks In Manet”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 2, 2012, pp. 458 - 469, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [11] S. A. Nagtilak and Prof. U.A. Mande,, “The Detection of Routing Misbehavior in Mobile Ad Hoc Networks using the 2ack Scheme with OLSR Protocol”, International Journal of Computer Engineering Technology (IJCET), Volume 1, Issue 1, 2010, pp. 213 - 234, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [12] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using Reconfigurable Hardware”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [13] S. A. Nagtilak and Prof. U.A. Mande,, “A Survey of Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, International Journal of Computer Engineering Technology (IJCET), Volume 1, Issue 2, 2010, pp. 106 - 117, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 47
Baixar agora