A Protective Scheme To Prevent The Attacker From Forging Acknowledgment Packets In Manets’s Using Eaack
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Amongst all the modern wireless networks Mobile Ad hoc network (MANET) is one of the most significant and exclusive applications. MANET does not necessitate a fixed network infrastructure every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Or else they depend on their neighbours to relay messages. The self-configuring capability of nodes in MANET made it well-liked among decisive mission applications like military use or emergency recovery. Though the open medium and broad allocation of nodes make MANET susceptible to malicious attackers. It is crucial to build up well-organized intrusiondetection mechanisms to guard MANET from attacks. With the developments of the technology and cut in hardware costs we are observing a current trend of expanding MANETs into industrial applications. We propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) particularly considered for MANETs.
Authors and Affiliations
K Pravardhan, U Vinod Kumar
A Novel Model and Efficient Topic Extraction for Travel Package Recommendation
The new concept recommendation system is applying in many applications.in this project explore the online travel information of tourists to provide personalized travel package. But traditional recommendation system c...
An Algorithm To Compute The SR Score And Parameters To Tune Its Performance
Keyword query interfaces (KQIs) for list have involved much notice in the last decade due to their suppleness and ease of use in searching and discover the data. Because any unit in a data set that enclose the query...
An Improved Performance of MANET using AODV Protocol for Black Hole Detection
Routing attacks have been identified for single path routing in wireless ad hoc networks. The effects of routing attacks on multipath routing have not been addressed so far. In this paper, an approach have been propo...
Infiltrate Testing Tool for Web Services Security
For distributed computing solutions Web Services are widely used. Web Services technology is used to integrate existing homogenous or heterogeneous enterprise applications. It can also be used to build inter-operable...
A Proposed System and Scheduling Algorithm for Grid based Indian Rural health Care
This paper focusses on proposing a system for grid based health care center. The paper dicusses the importance of health care center and grid computing. It also focusses on the proposed sytem architecture for the sys...