Enhancing Key Management In Intrusion Detection System For Manets
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Manets are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is no defined topology for Manets. Due to this lack of infrastructure and distributed nature they are more vulnerable for attacks and provide a good scope to malicious users to become part of the network. To prevent the security of mobile ad hoc networks many security measures are designed such as encryption algorithms, firewalls etc. EAACK is designed based on the Digital signature Algorithm (DSA) and RSA. those techniques have drawbacks due to the collusions of packets and distribution of keys between nodes becomes overhead. We propose a new alternate technique by developing a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV.
Authors and Affiliations
Shyama Sudarsan, , Vinodhini, , Dr. S. Karthik,
Audio-Based Action Scene Classification Using HMM-SVM Algorithm
Nowadays, there are many kind of video such as educational movies, multimedia movies, action movies and scientific movies etc. The careful analysis and classification of movies are very important. For example, movi...
Positioning of mobile station using Received signal strength and Time of arrival
Positioning of users or Mobile Station (MS) in cellular systems becomes an interesting topic since the related number of applications for the location information is growing rapidly. Deploying such applications wou...
Exploring Concept Map and Its Role As Knowledge Assessment Tool (2009-2012)
This study was carried out to explore and analyze Concept Map (CM) and its role as knowledge assessment tool in the educational setups (traditional, e-learning and m-learning). A CM is a two dimensional graph based visua...
Position based Routing Protocols for Wireless Ad hoc Networks: A Critical Survey
A Mobile Ad-hoc Network is a collection of wireless nodes that cooperatively form a network in the absence of any infrastructure or administration. In this paper we present an overview of position based routing protocols...
Query Optimization: Finding the Optimal Execution Strategy
The query optimizer is the component of a database management system that attempts to determine the most efficient way to execute a query. The optimizer considers the possible query plans for a given input query, a...