A Protective Scheme To Prevent The Attacker From Forging Acknowledgment Packets In Manets’s Using Eaack
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Amongst all the modern wireless networks Mobile Ad hoc network (MANET) is one of the most significant and exclusive applications. MANET does not necessitate a fixed network infrastructure every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Or else they depend on their neighbours to relay messages. The self-configuring capability of nodes in MANET made it well-liked among decisive mission applications like military use or emergency recovery. Though the open medium and broad allocation of nodes make MANET susceptible to malicious attackers. It is crucial to build up well-organized intrusiondetection mechanisms to guard MANET from attacks. With the developments of the technology and cut in hardware costs we are observing a current trend of expanding MANETs into industrial applications. We propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) particularly considered for MANETs.
Authors and Affiliations
K Pravardhan, U Vinod Kumar
A Survey on Routing Protocols for Wireless Sensor Networks
A wireless sensor network is a specialized wireless network consisting of a large number of sensors and at least one base station. The most important difference between the wireless sensor network and the traditional...
Sensors Based Automated Wheelchair
This proposed method is mainly useful for handicapped persons who are suffering with Parkinson’s disease or physically disabled or paralytic patients. These type of persons are cannot move their own. They always depe...
Design of a CPW –Fed L slit antenna for X band application
A coplanar waveguide (CPW) fed antenna with L-slit is presented in this paper. Two L-slits are introduced both sides of the patch to reduce the resonant frequency.The antenna has been designed on a FR4 substrate with...
Improved technique for object detection using Similarity Based Region Merging
object segmentation is an important task in image processing and computer vision. We address a method to effectively discover a user’s concept when object of interest are involved in input image. In this paper our met...
Vigorous Data Provision And Organization By Using Gossip Protocol
Cloud computing is focused on virtual mechanism data storage and sharing on web services. The cloud environment consists of several elements such as clients and distributions. It includes fault tolerance, high availa...