SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME 
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING  
TECHNOLOGY (IJCET) 
ISSN 0976 – 6367(Print) 
ISSN 0976 – 6375(Online) 
Volume 5, Issue 7, July (2014), pp. 43-47 
© IAEME: www.iaeme.com/IJCET.asp 
Journal Impact Factor (2014): 8.5328 (Calculated by GISI) 
www.jifactor.com 
IJCET 
© I A E M E 
HYBRID CRYPTOGRAPHY ALGORITHMS FOR SECURE EAACK IN 
MANET 
Swati R. Salunke, Prof. S. Pratap Singh 
Student Professor 
43 
ABSTRACT 
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without 
using any existing infrastructure. MANET is a collection of mobile nodes along with wireless 
transmitter and receiver that with each other via a bi-directional links either directly or indirectly. A 
new intrusion detection system named communicates Enhanced Adaptive Acknowledgment 
(EAACK) specially designed for MANETs. It is based on the digital signature algorithm (DSA). To 
enhance the security in the mobile adhoc networks, we introduce a new approach called Hybrid 
cryptography algorithm that provides integrity, confidentiality and authentication. This hybrid 
cryptography algorithm is based on two cryptography algorithms such as RSA and AES. Encryption is 
achieved by using, RSA algorithm for authentication and symmetric algorithm for the integrity. By 
using the symmetric and asymmetric cryptographic algorithm, we can achieve better security and 
integrity than the EAACK. 
Index Terms: AES, Digital Signature Algorithm (DSA), Enhanced Acknowledgment (EAACK), 
Mobile Adhoc Network (MANET), RSA. 
I. INTRODUCTION 
Now a days wireless network has much more preferences than the wired network due to the 
mobility and scalability nature of wireless network made it possible in many applications. All the 
contemporary wireless networks, Mobile Ad hoc Network is one of the most important and unique 
applications. MANET is a collation of independent nodes along with transmitter and the receiver that 
can directly communicate with each other via a bidirectional link. MANET does not require a fixed 
infrastructure. MANET is a self-configuring network that is formed automatically by a collection of 
mobile nodes without the help of a centralized management. Each node is equipped with a wireless
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME 
transmitter and receiver, which allow it to communicate with other nodes in its radio communication 
range. In order for a node to forward a packet to a node that is out of its radio range, the cooperation of 
other nodes in the network is needed, this is known as multi-hop communication. Therefore in 
MANET each node acts as both a host and a router at the same time. 
MANET consists of two types i.e. single hop and multi hop [1]. In single hop MANET all node 
are present in a same communication range and they can directly communicate with each other and in 
multihop, where several intermediate nodes relay the packets sent by the source node before they reach 
the destination node. But due to the open nature of the MANET it is vulnerable to the various types of 
attacks. To prevent from the malicious attacks on the MANET a new scheme is introduce i.e. Intrusion 
Detection System (IDS). 
44 
II. RELATED WORK 
Each node in MANETs assumes that other nodes always work together with each other to relay 
data. Due to the open nature of the MANET attackers get the significant impact on the network with 
just one or two compromised nodes. To eliminate the potential damages caused by compromised 
address this problem, Intrusion Detection System (IDS) [2] should be added to enhance the security 
level of the MANETs. If MANET can detect the attackers as soon as they enter in to the network and 
IDS acts as a second layer in a MANETs. IDS consist of three approaches such as Watchdog, 
TWOACK and AACK. 
The watchdog scheme is proposed by the Marti et al. [3]. It consists of two parts, namely 
Watchdog and Path rates. Watchdog serves as an intrusion detection system for MANETs. It is 
responsible for detecting malicious nodes in the network. Watchdog detects malicious is behavior by 
promiscuously listens to its next hops transmission. If Watchdog node overhears that its next node fails 
to forward the packet within a certain period of time, it increases its failure counter. If the nodes are not 
successes in a predefined threshold, the watchdog node reports it as misbehaving. In this case, the Path 
rater cooperates with the routing protocols to avoid the reported nodes in future transmission. But 
Watchdog faces many problems such as receiver collision, partial dropping, limited transmission 
power, false misbehavior report, ambiguous collisions. 
TWOACK scheme is proposed by Liu et al [4]. TWOACK is neither an agreeable nor a 
Watchdog based scheme. It is able to solve the receiver collision and limited transmission power 
problem of Watchdog. TWOACK finding misbehaving links by acknowledging every data packets 
transmitted over each one after the other three nodes along the path from the source to destination. And 
the third, Adaptive ACKnowledgement (AACK) new scheme proposed by Sheltami et al. [5]. AACK 
is based on the TWOACK, which provides an end to end acknowledgement scheme called ACK. As 
compared to TWOACK, AACK significantly reduced network overhead while still capable of 
maintaining or surpassing the same network throughput [8]. 
III. EXISTING SYSTEM 
EAACK is a new acknowledgement based scheme. EAACK removes all six weakness of the 
Watchdog scheme. The Digital Signature Algorithm (DSA) is to prevent the attacker from forging 
acknowledgement packets. EAACK is consisted of three major parts, namely, ACK, S-ACK (Secure 
ACK) and MRA (Misbehavior Report Authentication) [1]. ACK is basically end to end 
acknowledgement scheme. In ACK mode, node S first sends out an ACK data packet to the destination 
node D. IF all the intermediate nodes along the route between nodes source S to destination D node are 
cooperate with each other and node D successfully receives a packet send by sending a Secure ACK 
(S-ACK) data packet to detect the misbehaving nodes in the route.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME 
ACK is basically end to end acknowledgement scheme. In ACK mode, node S first sends out an ACK 
data packet to the destination node D. IF all the intermediate nodes along the route between nodes 
source S to destination D node are cooperate with each other and node D successfully receives a packet 
send by sending a Secure ACK (S-ACK) data packet to detect the misbehaving nodes in the route. 
Secure-ACK is a improved version of ACK scheme proposed by Liu et al [6]. In the S-ACK 
scheme to detect the misbehaving nodes every three successive nodes work in a group. In the three 
successive nodes the S-ACK acknowledgement packet is sent by the third node to the first node. This 
S-ACK scheme is able to detect the misbehaving nodes in a MANET along with the receiver collision 
and low transmission power. 
In watchdog scheme, it fails to detect the misbehaving node due to the presence of a false 
misbehavior report. Because of this false report information the Watchdog reports a normal node as 
malicious node. To overcome this drawback of the watchdog MRA (Misbehavior Report 
Authentication) scheme is used. MRA scheme is to authenticate whether the destination node has 
received the reported missing packet through a different route. For this the source node seeks its local 
knowledge base and identifies the other route to the destination node. If there is no route to the 
destination by using the DSR routing request to find the alternate route. Where the MRA packet is 
received by the destination node, it compares with using the local knowledge base whether the reported 
packet was received or not. If already received it make a decision, and it is a false misbehavior report. 
In EAACK, Digital Signature is used to prevent the attackers from acknowledgment packets. 
The three schemes of the EAACK are ACK, S-ACK and MRA are acknowledgement based detection 
systems. To detect the misbehaviors in the network, this all three schemes are relay on the 
acknowledgement packets. All acknowledgement packets in the EAACK are authentic. Otherwise the 
attackers will give the false acknowledgement; all three schemes are susceptible. So, the digital 
signature in EACCK to ensure the integrity of the intrusion detection system [7]. It requires all 
acknowledgment packets to be digitally signed before they are sent out and verified until they are 
accepted. But it requires additional resources due to the digital signature in mobile adhoc network. 
45 
IV. PROPOSED WORK 
In EAACK scheme we use a digital signature algorithm for to ensure the integrity of the 
intrusion detection system. In EAACK scheme all acknowledgement packets to be digitally signed 
before they are sent out and verified until they accepted [9]. If attackers are able to send the false 
acknowledgement packets, all of the schemes of EAACK are vulenerable and existing system cannot 
able to reduce the network overhead caused by digital signature. To enhance the security in the 
MANET, we introduce a new approach called Hybrid Cryptography algorithm that provides integrity, 
confidentiality and authentication. 
Our proposed system, hybrid cryptography algorithms consists of symmetric and asymmetric 
algorithm. The public key cryptography is also known as asymmetric cryptography, which means 
requires two separates keys such as private (secret) key and another is public key. In symmetric 
algorithm, there is only one key which is used for both encryption and decryption. In our system we use 
the symmetric algorithm, AES used for encryption of data and generate AES key for encryption. The 
symmetric cryptography techniques are used to achieve both the confidentiality and integrity in our 
system. The asymmetric algorithm, RSA is used for encryption of symmetric AES key. The public 
cryptography is used to achieve secure authentication in our system.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME 
46 
V. EXPERIMENTAL RESULTS 
Packet Delivery Ratio (PDR) is a ratio of the number of packets received by the destination 
node to the number of packets sent by the source node .The graph of packet Delivery Ratio shown in 
figure in which PDR ranging from 0 to 1 is taken along y-axis and malicious nodes are taken on the 
x-axis. We can infer as the number of malicious nodes are decreases then the PDR will increases. 
Among the two response mechanisms, we also notice the packets delivery ratio of hybrid cryptography 
of EAACK response is higher than those of other approach EAACK (DSA and RSA). 
VI. CONCLUSION 
To increase the security level in the mobile ad hoc networks, we use a intrusion detection 
system called as EAACK. Along with the Digital signature algorithm in EAACK is to prevent the 
attackers from forged acknowledgement attacks. In the EAACK all the packets are digitally signed 
before they send out and verified after they are accepted. But the DSA in EAACK consumes more 
resources and also the security level will decrease. To enhance the security level and increase the 
integrity, confidentiality and authentication we use a hybrid cryptography algorithm. In our system, 
hybrid cryptography techniques consist of RSA and AES algorithm. 
REFERENCES 
[1] Elhladi M. Shakshuki, Nan Kang and Tarek R. Sheltami, EAACK A Secure 
Intrusion-Detection System for MANETs, in IEEE Transactions on Industrial Electronics, 
vol. 60, NO. 3, MARCH 2013. 
[2] B. Sun Intrusion detection in mobile ad hoc networks, Texas AM Univ., College Station, TX, 
2004. 
[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc 
networks, in Proc. 6th Annu. Int. Conf. Mobile Comput, Net. boston, MA, 2000, pp. 255-265. 
[4] R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and 
Public-key Cryptosystems. In the Communications of ACM, vol. 20, pp 120-126, 1978. 
[5] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis. Secure Routing and Intrusion 
Detection in Ad hoc Networks, In the Proceedings of 3rd International Conference on 
Pervasive Computing and Communication, pp. 191-199, 2005. 
[6] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, Video transmission 
enhancement in presence of misbehaving nodes in MANETs Int. J. Multimedia Syst., vol. 15, 
no. 5, pp. 273-282, Oct. 2009. 
[7] N. Kang, E. Shakshuki , and T. Sheltami , Detecting misbehaving nodes in MANETs, in Proc. 
12th Int. Conf. ii WAS, Paris, France, Nov. 8-10,2010, pp. 216-222.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME 
[8] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, Video transmission 
enhancement in presence of misbehaving nodes in MANETs Int. J. Multimedia Syst., 
vol. 15, no. 5, pp. 273-282, Oct. 2009. 
[9] Swati R. Salunke, S. Pratap Singh, EAACK- Intrusion Detection System for MANET, National 
Conf. on Computer Engineering PG Conference, Pune. pp. 724, april 2014. 
[10] Shah Vrutik, Dr.Nilesh Modi and Patani Ashwin, “AODVGAP-An Acknowledgment Based 
Approach To Mitigate Selective Forwarding Attacks In Manet”, International Journal of 
Computer Engineering  Technology (IJCET), Volume 3, Issue 2, 2012, pp. 458 - 469, 
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 
[11] S. A. Nagtilak and Prof. U.A. Mande,, “The Detection of Routing Misbehavior in Mobile Ad 
Hoc Networks using the 2ack Scheme with OLSR Protocol”, International Journal of 
Computer Engineering  Technology (IJCET), Volume 1, Issue 1, 2010, pp. 213 - 234, 
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 
[12] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using 
Reconfigurable Hardware”, International Journal of Computer Engineering  Technology 
(IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online: 
0976 – 6375. 
[13] S. A. Nagtilak and Prof. U.A. Mande,, “A Survey of Mitigating Routing Misbehavior in Mobile 
Ad Hoc Networks”, International Journal of Computer Engineering  Technology (IJCET), 
Volume 1, Issue 2, 2010, pp. 106 - 117, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 
47

Mais conteúdo relacionado

Mais procurados

EAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System OverviewEAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System Overviewvpmmguys
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Attacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A SurveyAttacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A SurveyIJERA Editor
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackIJERA Editor
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET Journal
 
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...IRJET Journal
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...IJLT EMAS
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detectioniosrjce
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksiosrjce
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVIJERA Editor
 
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...theijes
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network SecurityLim Jung
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 

Mais procurados (19)

EAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System OverviewEAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System Overview
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Attacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A SurveyAttacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A Survey
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
 
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
E42043640
E42043640E42043640
E42043640
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
 
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security[Ppt] Survey Of Vehicular Network Security
[Ppt] Survey Of Vehicular Network Security
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 

Destaque

Winter in Greece.
Winter in Greece.Winter in Greece.
Winter in Greece.Nikos
 
[Mercado Pecuário] Principais notícias - 12/12/11
[Mercado Pecuário] Principais notícias - 12/12/11[Mercado Pecuário] Principais notícias - 12/12/11
[Mercado Pecuário] Principais notícias - 12/12/11AgroTalento
 
OpenERP Preventive maintenance
OpenERP Preventive maintenanceOpenERP Preventive maintenance
OpenERP Preventive maintenanceAvanzosc, S.L.
 
Beautiful sunsets. 4
Beautiful  sunsets. 4Beautiful  sunsets. 4
Beautiful sunsets. 4Nikos
 
Lalimentacidelsanimals 090520050257-phpapp02
Lalimentacidelsanimals 090520050257-phpapp02Lalimentacidelsanimals 090520050257-phpapp02
Lalimentacidelsanimals 090520050257-phpapp02aulaprimerb
 
Bronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacion
Bronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacionBronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacion
Bronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacionJavier González de Dios
 
[Mercado Pecuário] Principais Notícias 16-dez-2011
[Mercado Pecuário] Principais Notícias 16-dez-2011[Mercado Pecuário] Principais Notícias 16-dez-2011
[Mercado Pecuário] Principais Notícias 16-dez-2011AgroTalento
 
255 274 - relatório final inquérito
255 274 - relatório final inquérito255 274 - relatório final inquérito
255 274 - relatório final inquéritoRoberto Rabat Chame
 
Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012
Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012
Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012IAB Netherlands
 
Granxas e adegas monasticas_sobrado
Granxas e adegas monasticas_sobradoGranxas e adegas monasticas_sobrado
Granxas e adegas monasticas_sobradoMUSEO ETNOLOXICO
 
La lluna gonzalo
La lluna gonzaloLa lluna gonzalo
La lluna gonzaloTxema Gs
 
Redes Sociales - RS0610
Redes Sociales - RS0610Redes Sociales - RS0610
Redes Sociales - RS0610miguelabrilg9
 
Digital Rhetoric, October 21, 2014
Digital Rhetoric, October 21, 2014Digital Rhetoric, October 21, 2014
Digital Rhetoric, October 21, 2014Miami University
 
Observam la nostra llengua
Observam la nostra llenguaObservam la nostra llengua
Observam la nostra llenguaaulaprimerb
 

Destaque (20)

Agenda
Agenda Agenda
Agenda
 
Winter in Greece.
Winter in Greece.Winter in Greece.
Winter in Greece.
 
[Mercado Pecuário] Principais notícias - 12/12/11
[Mercado Pecuário] Principais notícias - 12/12/11[Mercado Pecuário] Principais notícias - 12/12/11
[Mercado Pecuário] Principais notícias - 12/12/11
 
Ensayo del curso de redes
Ensayo del curso de redesEnsayo del curso de redes
Ensayo del curso de redes
 
OpenERP Preventive maintenance
OpenERP Preventive maintenanceOpenERP Preventive maintenance
OpenERP Preventive maintenance
 
Beautiful sunsets. 4
Beautiful  sunsets. 4Beautiful  sunsets. 4
Beautiful sunsets. 4
 
Lalimentacidelsanimals 090520050257-phpapp02
Lalimentacidelsanimals 090520050257-phpapp02Lalimentacidelsanimals 090520050257-phpapp02
Lalimentacidelsanimals 090520050257-phpapp02
 
Bronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacion
Bronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacionBronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacion
Bronquioitisl tratamiento en servicio urgencias: variabilidad y adecuacion
 
Web 04
Web 04Web 04
Web 04
 
Adviento 2011
Adviento 2011Adviento 2011
Adviento 2011
 
[Mercado Pecuário] Principais Notícias 16-dez-2011
[Mercado Pecuário] Principais Notícias 16-dez-2011[Mercado Pecuário] Principais Notícias 16-dez-2011
[Mercado Pecuário] Principais Notícias 16-dez-2011
 
255 274 - relatório final inquérito
255 274 - relatório final inquérito255 274 - relatório final inquérito
255 274 - relatório final inquérito
 
Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012
Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012
Presentatie Jeroen Douchet: E-reading & Tablet Event 22-03-2012
 
Granxas e adegas monasticas_sobrado
Granxas e adegas monasticas_sobradoGranxas e adegas monasticas_sobrado
Granxas e adegas monasticas_sobrado
 
La lluna gonzalo
La lluna gonzaloLa lluna gonzalo
La lluna gonzalo
 
Redes Sociales - RS0610
Redes Sociales - RS0610Redes Sociales - RS0610
Redes Sociales - RS0610
 
Afip
AfipAfip
Afip
 
Afip
AfipAfip
Afip
 
Digital Rhetoric, October 21, 2014
Digital Rhetoric, October 21, 2014Digital Rhetoric, October 21, 2014
Digital Rhetoric, October 21, 2014
 
Observam la nostra llengua
Observam la nostra llenguaObservam la nostra llengua
Observam la nostra llengua
 

Semelhante a 50120140507006

Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackeSAT Publishing House
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkgraphhoc
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
 
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKSELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKFransiskeran
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...IAEME Publication
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2JPINFOTECH JAYAPRAKASH
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsJPINFOTECH JAYAPRAKASH
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
Preventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetPreventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetIOSR Journals
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 

Semelhante a 50120140507006 (20)

Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
50120140504011
5012014050401150120140504011
50120140504011
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc network
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKSELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
 
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
Preventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetPreventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In Manet
 
B010120913
B010120913B010120913
B010120913
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

50120140507006

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E HYBRID CRYPTOGRAPHY ALGORITHMS FOR SECURE EAACK IN MANET Swati R. Salunke, Prof. S. Pratap Singh Student Professor 43 ABSTRACT Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes along with wireless transmitter and receiver that with each other via a bi-directional links either directly or indirectly. A new intrusion detection system named communicates Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. It is based on the digital signature algorithm (DSA). To enhance the security in the mobile adhoc networks, we introduce a new approach called Hybrid cryptography algorithm that provides integrity, confidentiality and authentication. This hybrid cryptography algorithm is based on two cryptography algorithms such as RSA and AES. Encryption is achieved by using, RSA algorithm for authentication and symmetric algorithm for the integrity. By using the symmetric and asymmetric cryptographic algorithm, we can achieve better security and integrity than the EAACK. Index Terms: AES, Digital Signature Algorithm (DSA), Enhanced Acknowledgment (EAACK), Mobile Adhoc Network (MANET), RSA. I. INTRODUCTION Now a days wireless network has much more preferences than the wired network due to the mobility and scalability nature of wireless network made it possible in many applications. All the contemporary wireless networks, Mobile Ad hoc Network is one of the most important and unique applications. MANET is a collation of independent nodes along with transmitter and the receiver that can directly communicate with each other via a bidirectional link. MANET does not require a fixed infrastructure. MANET is a self-configuring network that is formed automatically by a collection of mobile nodes without the help of a centralized management. Each node is equipped with a wireless
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME transmitter and receiver, which allow it to communicate with other nodes in its radio communication range. In order for a node to forward a packet to a node that is out of its radio range, the cooperation of other nodes in the network is needed, this is known as multi-hop communication. Therefore in MANET each node acts as both a host and a router at the same time. MANET consists of two types i.e. single hop and multi hop [1]. In single hop MANET all node are present in a same communication range and they can directly communicate with each other and in multihop, where several intermediate nodes relay the packets sent by the source node before they reach the destination node. But due to the open nature of the MANET it is vulnerable to the various types of attacks. To prevent from the malicious attacks on the MANET a new scheme is introduce i.e. Intrusion Detection System (IDS). 44 II. RELATED WORK Each node in MANETs assumes that other nodes always work together with each other to relay data. Due to the open nature of the MANET attackers get the significant impact on the network with just one or two compromised nodes. To eliminate the potential damages caused by compromised address this problem, Intrusion Detection System (IDS) [2] should be added to enhance the security level of the MANETs. If MANET can detect the attackers as soon as they enter in to the network and IDS acts as a second layer in a MANETs. IDS consist of three approaches such as Watchdog, TWOACK and AACK. The watchdog scheme is proposed by the Marti et al. [3]. It consists of two parts, namely Watchdog and Path rates. Watchdog serves as an intrusion detection system for MANETs. It is responsible for detecting malicious nodes in the network. Watchdog detects malicious is behavior by promiscuously listens to its next hops transmission. If Watchdog node overhears that its next node fails to forward the packet within a certain period of time, it increases its failure counter. If the nodes are not successes in a predefined threshold, the watchdog node reports it as misbehaving. In this case, the Path rater cooperates with the routing protocols to avoid the reported nodes in future transmission. But Watchdog faces many problems such as receiver collision, partial dropping, limited transmission power, false misbehavior report, ambiguous collisions. TWOACK scheme is proposed by Liu et al [4]. TWOACK is neither an agreeable nor a Watchdog based scheme. It is able to solve the receiver collision and limited transmission power problem of Watchdog. TWOACK finding misbehaving links by acknowledging every data packets transmitted over each one after the other three nodes along the path from the source to destination. And the third, Adaptive ACKnowledgement (AACK) new scheme proposed by Sheltami et al. [5]. AACK is based on the TWOACK, which provides an end to end acknowledgement scheme called ACK. As compared to TWOACK, AACK significantly reduced network overhead while still capable of maintaining or surpassing the same network throughput [8]. III. EXISTING SYSTEM EAACK is a new acknowledgement based scheme. EAACK removes all six weakness of the Watchdog scheme. The Digital Signature Algorithm (DSA) is to prevent the attacker from forging acknowledgement packets. EAACK is consisted of three major parts, namely, ACK, S-ACK (Secure ACK) and MRA (Misbehavior Report Authentication) [1]. ACK is basically end to end acknowledgement scheme. In ACK mode, node S first sends out an ACK data packet to the destination node D. IF all the intermediate nodes along the route between nodes source S to destination D node are cooperate with each other and node D successfully receives a packet send by sending a Secure ACK (S-ACK) data packet to detect the misbehaving nodes in the route.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME ACK is basically end to end acknowledgement scheme. In ACK mode, node S first sends out an ACK data packet to the destination node D. IF all the intermediate nodes along the route between nodes source S to destination D node are cooperate with each other and node D successfully receives a packet send by sending a Secure ACK (S-ACK) data packet to detect the misbehaving nodes in the route. Secure-ACK is a improved version of ACK scheme proposed by Liu et al [6]. In the S-ACK scheme to detect the misbehaving nodes every three successive nodes work in a group. In the three successive nodes the S-ACK acknowledgement packet is sent by the third node to the first node. This S-ACK scheme is able to detect the misbehaving nodes in a MANET along with the receiver collision and low transmission power. In watchdog scheme, it fails to detect the misbehaving node due to the presence of a false misbehavior report. Because of this false report information the Watchdog reports a normal node as malicious node. To overcome this drawback of the watchdog MRA (Misbehavior Report Authentication) scheme is used. MRA scheme is to authenticate whether the destination node has received the reported missing packet through a different route. For this the source node seeks its local knowledge base and identifies the other route to the destination node. If there is no route to the destination by using the DSR routing request to find the alternate route. Where the MRA packet is received by the destination node, it compares with using the local knowledge base whether the reported packet was received or not. If already received it make a decision, and it is a false misbehavior report. In EAACK, Digital Signature is used to prevent the attackers from acknowledgment packets. The three schemes of the EAACK are ACK, S-ACK and MRA are acknowledgement based detection systems. To detect the misbehaviors in the network, this all three schemes are relay on the acknowledgement packets. All acknowledgement packets in the EAACK are authentic. Otherwise the attackers will give the false acknowledgement; all three schemes are susceptible. So, the digital signature in EACCK to ensure the integrity of the intrusion detection system [7]. It requires all acknowledgment packets to be digitally signed before they are sent out and verified until they are accepted. But it requires additional resources due to the digital signature in mobile adhoc network. 45 IV. PROPOSED WORK In EAACK scheme we use a digital signature algorithm for to ensure the integrity of the intrusion detection system. In EAACK scheme all acknowledgement packets to be digitally signed before they are sent out and verified until they accepted [9]. If attackers are able to send the false acknowledgement packets, all of the schemes of EAACK are vulenerable and existing system cannot able to reduce the network overhead caused by digital signature. To enhance the security in the MANET, we introduce a new approach called Hybrid Cryptography algorithm that provides integrity, confidentiality and authentication. Our proposed system, hybrid cryptography algorithms consists of symmetric and asymmetric algorithm. The public key cryptography is also known as asymmetric cryptography, which means requires two separates keys such as private (secret) key and another is public key. In symmetric algorithm, there is only one key which is used for both encryption and decryption. In our system we use the symmetric algorithm, AES used for encryption of data and generate AES key for encryption. The symmetric cryptography techniques are used to achieve both the confidentiality and integrity in our system. The asymmetric algorithm, RSA is used for encryption of symmetric AES key. The public cryptography is used to achieve secure authentication in our system.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME 46 V. EXPERIMENTAL RESULTS Packet Delivery Ratio (PDR) is a ratio of the number of packets received by the destination node to the number of packets sent by the source node .The graph of packet Delivery Ratio shown in figure in which PDR ranging from 0 to 1 is taken along y-axis and malicious nodes are taken on the x-axis. We can infer as the number of malicious nodes are decreases then the PDR will increases. Among the two response mechanisms, we also notice the packets delivery ratio of hybrid cryptography of EAACK response is higher than those of other approach EAACK (DSA and RSA). VI. CONCLUSION To increase the security level in the mobile ad hoc networks, we use a intrusion detection system called as EAACK. Along with the Digital signature algorithm in EAACK is to prevent the attackers from forged acknowledgement attacks. In the EAACK all the packets are digitally signed before they send out and verified after they are accepted. But the DSA in EAACK consumes more resources and also the security level will decrease. To enhance the security level and increase the integrity, confidentiality and authentication we use a hybrid cryptography algorithm. In our system, hybrid cryptography techniques consist of RSA and AES algorithm. REFERENCES [1] Elhladi M. Shakshuki, Nan Kang and Tarek R. Sheltami, EAACK A Secure Intrusion-Detection System for MANETs, in IEEE Transactions on Industrial Electronics, vol. 60, NO. 3, MARCH 2013. [2] B. Sun Intrusion detection in mobile ad hoc networks, Texas AM Univ., College Station, TX, 2004. [3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in Proc. 6th Annu. Int. Conf. Mobile Comput, Net. boston, MA, 2000, pp. 255-265. [4] R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-key Cryptosystems. In the Communications of ACM, vol. 20, pp 120-126, 1978. [5] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis. Secure Routing and Intrusion Detection in Ad hoc Networks, In the Proceedings of 3rd International Conference on Pervasive Computing and Communication, pp. 191-199, 2005. [6] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, Video transmission enhancement in presence of misbehaving nodes in MANETs Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273-282, Oct. 2009. [7] N. Kang, E. Shakshuki , and T. Sheltami , Detecting misbehaving nodes in MANETs, in Proc. 12th Int. Conf. ii WAS, Paris, France, Nov. 8-10,2010, pp. 216-222.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 43-47 © IAEME [8] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, Video transmission enhancement in presence of misbehaving nodes in MANETs Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273-282, Oct. 2009. [9] Swati R. Salunke, S. Pratap Singh, EAACK- Intrusion Detection System for MANET, National Conf. on Computer Engineering PG Conference, Pune. pp. 724, april 2014. [10] Shah Vrutik, Dr.Nilesh Modi and Patani Ashwin, “AODVGAP-An Acknowledgment Based Approach To Mitigate Selective Forwarding Attacks In Manet”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 2, 2012, pp. 458 - 469, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [11] S. A. Nagtilak and Prof. U.A. Mande,, “The Detection of Routing Misbehavior in Mobile Ad Hoc Networks using the 2ack Scheme with OLSR Protocol”, International Journal of Computer Engineering Technology (IJCET), Volume 1, Issue 1, 2010, pp. 213 - 234, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [12] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using Reconfigurable Hardware”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [13] S. A. Nagtilak and Prof. U.A. Mande,, “A Survey of Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, International Journal of Computer Engineering Technology (IJCET), Volume 1, Issue 2, 2010, pp. 106 - 117, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 47