ENCRYPTION BASED INTRUSION DETECTION IN MANET USING AODV ROUTING PROTOCOL
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 2
Abstract
Nowadays, Network is more vulnerable to the security attacks. Especially The effective operation of Mobile Ad-hoc networks (MANETs) compromised by a variety of security attacks depends upon the various features. The unreliability of wireless links between nodes, topology changes, limited battery power and centralized control of MANET are the general features. The operation of nodes in selfish and conservation leads to misbehavior in nodes. In this paper, we implement the detection of nodes which exhibit the misbehavior of packet forwarding. This approach uses Adhoc on Demand Vector (AODV) in parallel for generation the list of misbehaving nodes. The problem of 2ACK algorithm in traditional methods is the detection of nodes associated with the misbehavior link. We propose a new framework in two phases to validate the problem. The first one is that using AODV routing protocols and find one way Acknowledgement using Path Tracing algorithms. The second phase is that another module giving more security in the way of Packet Routing with Encrypt the data and Decrypt data using ECC algorithm. One more security we can change our key random wise.
Authors and Affiliations
Abila Judith Suganthi S, Rajesh P
A SURVEY ON ERGODIC RATING PREDICTION USING SEQUENCE CLASSIFICATION
Sequence classification has an extensive of applications range such as analysis of the genome, retrieval of information, information about fitness, economics, and abnormal detection. Thus, it creates...
CHALLENGES OF BANKING INDUSTRY
The Indian banking industry has emerged as one of the strongest drivers of economic growth. Due to planned growth and implementation of IT banks banking industry has reached a new height. Th...
A SURVEY ON UNIFIED COMMUNICATION
In recent years, unified communication is becoming a critical part in enterprise communication. Voice, messaging, conferencing, presence and availability, and directories have all become fundamental requirements...
SECURE PRIVACY PRESERVING TECHNIQUES IN SMART PHONES : A REVIEW
The context aware applications are blooming with increasing the popularity of smartphones with sensors, these sensor applications arises the privacy is the major challenging issue because users...
STATIC ANALYSIS FOR EXTRACTING PERMISSION CHECKS IN ANDROID USING EVENT GRAPH TECHNIQUE
Applications for Android are written in Java which is then compiled into Dalvik byte code. Memory and processing power are limited, when the byte code is improve to run on devices. An Android applicat...