A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
Journal Title: International Journal of Advanced Research in Engineering and Technology - Year 2019, Vol 10, Issue 2
Abstract
Mobile ad hoc are gaining popularity because of availability of low-cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denials of service type of attacks are possible in the MANET and one of these type attacks is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol
Authors and Affiliations
SYEDA KAUSAR FATIMA, SYEDA GAUHAR FATIMA, SYED ABDUL SATTAR and D. SRINIVASA RAO
REHABILATION AND MAINTAINANCE OF ANCIENT BUILDING- A CASE STUDY OF SURGUJA DISTRICT
In this paper we are going to study about the failure of traditional buildings structure like cracks in beam column slabs or failure of these component due to various reasons like permanent loading, creep, temperature...
MULTI EXPOSURE IMAGE FUSION USING SYNCHROSQUEEZING TRANSFORM
A novel method for fusion of images with multiple exposure is proposed in this paper. Synchrosqueezing transform which gives more concentrated representation of a given signal. which is used for analyzing 1D signals ar...
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may...
AN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKS.
Nowadays, with the rapid development of science and technology and the everincreasing demand in every field, wireless sensor networks are emerging as a necessary scientific achievement to meet the demand of human in mod...
NUMERICAL AND EXPERIMENTAL VALIDATION OF CHIP MORPHOLOGY
The extensive research studies are used to divination the behavior of complex Metal cutting processes. The cutting parameters such as speed, feed and force play important role on conform chip morphology. The experiment...