Data Link Layer-Security Issues
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 7
Abstract
Security issues in the data link layer are not properly explained while network security problems in other layers of OSI model are studied and addressed. In this paper, we propose a new security inter-layering structure to secure data link layer in Internet protocol over Ethernet networks. In the data link layer, we have proposed to use secure namespaces instead of Media Access Control(MAC) to identify network devices, which provides a mean to bind data link layer with other layers of OSI model very securely. Present network structure provides a link to link security and the key establishment protocol to generate security parameters in this layer.
Authors and Affiliations
A Annapurna , Sheena Mohammed , D. Madhuri
Modified Booth Dadda Multiplier using Carry Look ahead adder Design and Implementation
This paper proposes a novel 8X8 bit Modified Booth Dadda Multiplier architecture which is an improved version of Modified Booth Wallace Multiplier. The idea involves the generation of partial products using Modified Boot...
Closed Regular Pattern Mining Using Vertical Format
Discovering interesting patterns in transactional databases is often a challenging area by the length of patterns and number of transactions in data mining, which is prohibitively expensive in both time and space. Closed...
Collision Avoidance Using WTRP-MAC Protocol for Clustered Wireless Sensor Network
In a clustered wireless sensor network, multiple accesses at a time lead to collision. This could cause retransmit of lost packets. It increases power consumption, decreases sensor lifetime and delay in packet transmissi...
A comparative study of fuzzy logic and weighted Association rule mining in frequent datasets
Mining of frequent patterns in transaction databases has been a fashionable area of research. Many methods are being used to solve the trouble of discovering association rules among items in large databases [8]. Transact...
e-Epidemic Model On Highly Infectious Nodes in the Computer Network
In this paper, we have developed a compartmental e-Epidemic SIJR (Susceptible-Infectious-Highly Infectious- Recovered) model of viruses in a computer network with natural death (that is, crashing of nodes due to the reas...