http://www.ijrcct.org/index.php/ojs/article/download/170/137
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
Mobile ad hoc networks offer excellent perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent characteristics of open medium, very dynamic topology, lack of infrastructure and lack of centralized management authority, MANET presents serious vulnerabilities to security attacks. In this paper, I propose an intrusion detection scheme based on extended finite state machines. I provide formal specification of the correct behavior of the routing protocol and by the means of a backward checking algorithm, detect run-time violations of the implementation. I chose the standard proactive routing protocol OLSR as a case study and show that my approach allows detecting several kinds of attacks as well as conformance anomalies.
Authors and Affiliations
Umesh Prasad Rout
Content Accumulating and Development beyond Elastic and Inelastic Traffic in Wireless Networks
Caching and multicasting at base stations are two promising ways to deal with bolster monstrous substance conveyance over remote systems. Be that as it may, existing planning outlines don't make full utilization of t...
Robust Approach For Query Grouping Using User Search Logs
We proposes user’s are increasingly pursuing complex task orient goals on the Web such as making travel arrangements to managing finances or planning purchases. To better support users in their long term information...
VLSI Implementation and Design of Digital Modulation Using Xilinx
In this Paper, Digital Modulators is designed and Implemented using XILINX ISE Tool based on Very Large Scale Integration (VLSI). This is majorly to implement and obtain digitalize signals in softwaredefined radio (SD...
A Secure Mona Protocol for Data Sharing In Un-Trusted Cloud
Cloud computing provides different services economically and efficiently to share many resources among cloud users with low maintenance cost. But unfortunately, during this sharing process data preservation and data...
Dynamic Approach for Secure Data Publishing in Mining
More than a few anonymization techniques, such as simplification and bucketization, have been deliberate for privacy protecting micro data publishing. Current work has shown that generalization loses substantial quant...