Enhancing Key Management In Intrusion Detection System For Manets
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Manets are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is no defined topology for Manets. Due to this lack of infrastructure and distributed nature they are more vulnerable for attacks and provide a good scope to malicious users to become part of the network. To prevent the security of mobile ad hoc networks many security measures are designed such as encryption algorithms, firewalls etc. EAACK is designed based on the Digital signature Algorithm (DSA) and RSA. those techniques have drawbacks due to the collusions of packets and distribution of keys between nodes becomes overhead. We propose a new alternate technique by developing a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV.
Authors and Affiliations
Shyama Sudarsan, , Vinodhini, , Dr. S. Karthik,
A Three-Layer Architecture based Approach for Data Access Layer in the Information Systems Production
Software architecture as an important branch of software engineering is one of the significant issues in software production line. It makes communication between system elements and shows us the general structure of t...
Security and Privacy in Emerging Wireless Networks with Mobile Sinks
Mobile sinks (MSs) are more significant in many wireless sensor network (WSN) applications for well-organized data gathering and for unique and revoking compromised sensors. Mobile sinks are act as intermediate nod...
Design of a Cost Effective and environment friendly Off-Grid Wind-Diesel Hybrid Power System in Kutubdia Island of Bangladesh
This paper presents the Design of a cost effective andenvironment friendlyoff-grid wind-diesel hybrid power system in a grid isolated island, kutubdia, Bangladesh.Wind power is the clean source of renewable and fr...
Performance Comparison of Symmetric Data Encryption Techniques
In present scenario various data encryption algorithms are available for data security which has always been important in all aspects of life. Data may contain confidential form of information that one want to secu...
Modulation of Generalized Canonical CS-Transform
In this paper the generalized canonical CS- transform it is extended to the distribution of compact support by using kernel method. The analyticity and modulation theorems are proved for this transform. Also...