A Countermeasure for Black Hole Attack in Mobile WiMAX Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Mobile WiMAX has drawn much attention due to its benefits. Nevertheless, security is a challenge and has to be ensured. The attacker may make use of parts of unencrypted management messages and acquire information about the type of traffic, nodes involved, timing and so on. This work discusses about the attacks prevalent in mobile WiMAX and a prediction mechanism to foreknow the prevalence of Black hole attack, an attack in the network layer. This mechanism eliminates the vindictive nodes and provides better results in terms of Packet Delivery Ratio (PDR), Throughput, Control and Total overheads
Authors and Affiliations
M. Deva Priya , Dr. M. L. Valarmathi , S. Aishwarya , K. Jaya Bharathi
Analysis and Design of 3 LSB Techniques for Secure Audio Steganography
Information hiding has evolved since 1970’s and has become an integral part of internet in present century. This has been a keystone in the field of Information communication, as it saves data from losses, attacks and an...
Query Optimization: Finding the Optimal Execution Strategy
The query optimizer is the component of a database management system that attempts to determine the most efficient way to execute a query. The optimizer considers the possible query plans for a given input query, a...
Advanced Technique of Digital Watermarking based on SVD-DWT-DCT and Arnold Transform
With the growing popularity of internet and digital media, we propose a method of non-blind transform domain watermarking which is based on the Direction Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and...
GClustering Algorithm
—Graph clustering poses significant challenges because of the complex structures which may be present in the underlying data. The massive size of the underlying graph makes explicit structural enumeration very diff...
Anomaly Detection and Prevention in Network Traffic based on Statistical approach and α-Stable Model
Network traffic anomalies plunk for a huge division of the Internet traffic and conciliation the performance of the network resources. Detecting and diagnosing these threats is a protracted and time overriding ta...