Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 6
Abstract
Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb the network management Due to these attacks wireless networks integrity performance effectiveness gets affected Wireless networks mainly based on sharing this makes jammer to implement specific jamming attacks So because of this jamming attacks intended functions of network resources gets disturbed to neutralize effects of attacks we implemented puzzle security with added TESLA properties so that double coverage will be given to security.
Authors and Affiliations
Ugale Pradip, Hemlata Sunhare, Sachin Patel
Text Clustering Using Cosine Similarity and Matrix Factorization
Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters, thereby providing a basis for intuitive and informative navigation...
Secure Group Communication by Establishing a Novel Trust Relationship Model and Detecting Malicious nodes in Peer to Peer Systems
Trust administration in P2P framework is utilized to distinguish vindictive practices and to advance legitimate and agreeable communications. The fundamental objective of the prior P2P frameworks is the capacity of c...
Identifying Misuse of Data In Cloud
Cloud Storage Enables Users To Store Their Data Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protecti...
Design and Implementation of Body Movement Recognition System
In this project body movement recognition system based on the Non-vision over the Zigbee Wireless Sensor Network. Now a day's always (day and night time) vision based coma, paralysis patient’s posture information can...
Secure Authentication Schemes
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...