An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 1

Abstract

Authors and Affiliations

M. Dhivyasri , P. E. Prem , A. Nithyasri

Keywords

Related Articles

Efficient Data Gathering and Improving Network Lifetime in Wireless Sensor Networks

In large-scale wireless sensor networks the data-gathering mechanism to introducing mobility into the network. . We consider the location service in a WSN, where each sensor needs to maintain its location information by...

Password-Only Authenticated Key Exchange Using Distributed Server

Authentication using Password-authenticated key exchange using distributed server (PAKEUDE) is done where a cryptographic key - exchange of messages. Database of all passwords to authenticate clients are stored in a dist...

Survey of Spatial Approximate String Search

Several applications require finding objects closest to a specified location that contains a set of keywords. In view of example, online yellow pages allow users to specify an address and a set of keywords. In response,...

Weakly Supervised Critical Nugget Finding Algorithm for Improving Classification Accuracy

Accuracy is more important in data classification. An elimination of noisy data, attribute and property discovery is a major consideration in the proposed research. From the overall given population the system predicts t...

Novel Sensing Approach for Predicting SLA Violations

Customer contentment plays a vital role in business environment. Service level agreements (SLA’s) are signed between the service provider and the customer where SLA violation acts as a major constraint. SLA Violation is...

Download PDF file
  • EP ID EP104509
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

M. Dhivyasri, P. E. Prem, A. Nithyasri (2013). An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(1), 15-18. https://www.europub.co.uk/articles/-A-104509