DDoS Services Attacks In Mobile Ad-hoc Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
In vision of the growing demand for wireless information and data services, it is very important to providing faster and reliable mobile access to users. Today's, not only mobile phones, but also laptops and PDAs are used by people in their professional and private lives. These devices are used separately for the most part that is their applications do not interact. Sometimes, a group of mobile devices form a unstructured, temporary network as they move towards each other. This allows users to share documents, secret information and other useful information. This kind of unstructured, temporary network referred to as mobile ad hoc networks sometimes just called ad hoc networks or multi-hop wireless networks, and are expected to play an important role in our daily lives in near future. As the use of ad-hoc network increased the security concerned also needed to prevent the network from malicious users. In wired network , it is easy to provided security during transmission than the Mobile ad-hoc network. DDoS attack is a big problem in MANET. In these, paper we discussed about DDoS attacks and there detection mechanisms.
Authors and Affiliations
Anju, Vinod Saroha
Comparison Of Various 32-Bit Parallel Prefix Adders
In Very Large Scale Integration (VLSI) designs, Parallel prefix adders (PPA) have the higher delay performance. This paper investigates four varieties of PPA’s (Kogge Stone Adder (KSA), Spanning Tree Adder (STA), Brent...
Design and implementation of transmission of 128- bit digital data generated from a data generation unit from one base station to another base station with its reception at the receiver end using “Hamming (224,128) Code technique” written in VHDL code
The proposed paper mainly deals with the generation of the 128-bit digital data using a data generation unit with it transmission and reception over space. The data generation unit consists of control unit, data path un...
Automatic Fault Detection and Wireless Remote Monitoring for EB Transformer using Embedded System
This paper discusses about the techniques that are to be followed to save the expensive transformer by identifying the fault and monitor the parameters of the transformer with the wireless technology. In India Power Di...
Adapting New Generation Technologies in Smart Farming
Modern challenges of the present situation of our country is to improve the plant growth with low cost because as the population of the country is increasing need for the vegetation is becoming a major criteria, with th...
A Customized Adaptation of Traditional Lesk Method for Sense Disambiguation of Punjabi Words from Medical Domain
We report in this paper a way of doing Word Sense Disambiguation (WSD) that has its origin in multilingual MT. Various Machine Learning approaches have been demonstrated to produce relatively successful Word Sense Disam...