Using 3GPP- A Secure IDS for MANETs
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directly witheach other when they are both within the same communication range else they can propagate message to neighbor nodesto pass the message. A new intrusion detection system named Enhanced Adaptive Acknowledgement (EAACK) speciallydesigned for MANETs. By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite theexistence of false misbehavior report. The results will demonstrate positive performances against Watchdog, TWOACKand AACK in the cases of receiver collision, limited transmission power and false misbehavior report. EAACKdemonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the networkperformances. EAACK is designed based on the Digital signature Algorithm (DSA) and RSA. Those techniques havedrawback due to network overhead. We need techniques for security like encryptions, hybrid encryption or sign encryptionto protect our message.
Authors and Affiliations
Monika Garg, Karanvir Kaur, Simerpreet Kaur
Cascading Guided Search Cloud Service Search Engine
Cloud computing is one contemporary technology in which the research community has recently embarked. This paradigm shifts the location of the infrastructure to the network to reduce the costs associated with the managem...
A TABU SEARCH APPROACH FOR THE BI-OBJECTIVE HOSPITAL SITE DETERMINATION PROBLEM UNDER FUZZY ENVIRONMENT
The present paper attempts to study the bi-objective hospital site determination problem under fuzzy environment. In this paper, the concept of Tabu search is used for solving bi-objective facility location problem i.e....
Humanoid Robot Learning How to track and grip
Interaction with its environment is a key requisite for designing a humanoid robot especially to have the ability to recognize and manipulate unknown objects and it is crucial to successfully work in natural environments...
CLUSTERING IN WIRELESS SENSOR NETWORK: A REVIEW
WSNs are evolving as both a vital new domain in the IT environment and a hot research including system design, networking, and distributed algorithms, programming models, data management, security and social components....
EFFICIENT FPGA BASED MATRIX MULTIPLICATION USING MUX AND VEDIC MULTIPLIER
Most of the algorithms which are used in DSP, image and video processing, computer graphics, vision and high performance supercomputing applications require multiplication and matrix operation as the kernel operation.In...