A Protective Scheme To Prevent The Attacker From Forging Acknowledgment Packets In Manets’s Using Eaack
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Amongst all the modern wireless networks Mobile Ad hoc network (MANET) is one of the most significant and exclusive applications. MANET does not necessitate a fixed network infrastructure every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Or else they depend on their neighbours to relay messages. The self-configuring capability of nodes in MANET made it well-liked among decisive mission applications like military use or emergency recovery. Though the open medium and broad allocation of nodes make MANET susceptible to malicious attackers. It is crucial to build up well-organized intrusiondetection mechanisms to guard MANET from attacks. With the developments of the technology and cut in hardware costs we are observing a current trend of expanding MANETs into industrial applications. We propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) particularly considered for MANETs.
Authors and Affiliations
K Pravardhan, U Vinod Kumar
Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques
Recently Network Intrusion Detection System (IDS), is being used as the main security defending technique. It is second guard for a network after firewall. Various approaches from data mining to soft computing fields...
Invalid Detachment centered Outlier Recognition acquired from Reverse Nearest Neighbors
Data Mining essentially alludes to the extraction of exceptionally fascinating examples of the Data from the gigantic Data sets. Anomaly recognition is one of the imperative parts of Data mining which really discover...
Novel De-duplication Technique for Supporting Differential Privileges Check in H-Cloud
Clients are benefited storing their data in Cloud instead of local data management. But one critical challenge of cloud storage is management of huge volumes of data and lack of privacy and security which maximizes t...
Data Sharing In Cloud Storage Using Key Aggregate Cryptosystem
Cloud storage is getting exceptionally famous nowadays .The two noteworthy offices that cloud give are information stockpiling and information sharing. A protected information partaking in cloud is a critical issue....
Arm7 Based Electronic Travel Aid System for Blind People Navigation and Monitoring
This paper is intended to provide overall measures –object detection and real time assistance via Global Positioning System(GPS).This paper aims at the development of an Electronic Travelling Aid (ETA) kit to help th...