A Protective Scheme To Prevent The Attacker From Forging Acknowledgment Packets In Manets’s Using Eaack
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Amongst all the modern wireless networks Mobile Ad hoc network (MANET) is one of the most significant and exclusive applications. MANET does not necessitate a fixed network infrastructure every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Or else they depend on their neighbours to relay messages. The self-configuring capability of nodes in MANET made it well-liked among decisive mission applications like military use or emergency recovery. Though the open medium and broad allocation of nodes make MANET susceptible to malicious attackers. It is crucial to build up well-organized intrusiondetection mechanisms to guard MANET from attacks. With the developments of the technology and cut in hardware costs we are observing a current trend of expanding MANETs into industrial applications. We propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) particularly considered for MANETs.
Authors and Affiliations
K Pravardhan, U Vinod Kumar
Confident Multi-Owner File Partaking For Vibrant Units in the Cloud
Cloud computing is an evolving computing archetype in which resources of the computing infrastructure are delivered as services above the Internet. As auspicious as it is, this archetype also conveys forth many new d...
Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS
Mobile Ad hoc Network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administ...
Analysis of Four Stage Encryption
Four Stage Encryption generates the output alphabet from a given input alphabet. The size of the output alphabet depends upon the key K0. Unless this key is known, it is difficult to guess the size of the output alph...
An Advanced Scheme to Support Stronger Security By Encrypting The File With Differential Privilege Keys
Developing Cloud is registering innovation, giving measured administration and cash putting something aside for individual Users and associations. Information proprietors are exchanging nearby delicate information to...
A Novel Technique for Cost Reduction among Sender And Receiver In Cloud
We present PACK (Predictive ACKs), a novel endto-end activity repetition disposal (TRE) framework, intended for cloud computing clients. Cloud-based TRE needs to apply a sensible utilization of cloud assets so that th...