Avoiding Brute Force attack in MANET using Honey Encryption
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3
Abstract
Mobile adhoc network includes wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure. This MANET is vulnerable to different types of attacks due to the certain features of network. Lot of attacks are there in MANET .Brute forcing is one of the attack that can create problem in communication in a MANET network. Mainly focusing on single hoc MANET Honey encryption can prevent such attacks during the normal encrypted data transmission. This is new type of encryption in which when an attacker tries to brute force by different keys different decrypted data will be got, thus the brute forcer will be confused totally about the actual content. A new type of randomized message encoding scheme called a distribution-transforming encoder (DTE).
VLSI Implementation of an Optical OFDM Transmitter Using 180nm Technology
Orthogonal Frequency Division Multiplexing (OFDM) is a modulation technique which is used in broadband wired and wireless communication systems because it has an effective solution to inter symbol interference and inter...
Developing Firefox add-on for DOM vulnerability Assessment
Cross-site scripting (XSS) is a type of security vulnerability typically found in web applications which allows the attackers to inject malicious script into web pages/servers. XSS is the main cause of DOM attack. This a...
Bio-Inspired Methods for Efficient MANET
Bio-Inspired Methods for Efficient MANET
Types of Online Viral Marketing in Book Industry
Companies need to engage communities into their marketing activities. Community marketing is a strategy to engage an audience in an active, non-intrusive prospect and customer conversation that focus on the needs of exis...
Separable Reversible Data Hiding Using Matrix Addition Compression Approach For Color Images
"In this paper we have proposed a novel scheme for separable reversible data hiding using matrix addition approach for color images. In this proposed paper we have discussed that a content owner encrypts the original unc...