Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 6
Abstract
Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb the network management Due to these attacks wireless networks integrity performance effectiveness gets affected Wireless networks mainly based on sharing this makes jammer to implement specific jamming attacks So because of this jamming attacks intended functions of network resources gets disturbed to neutralize effects of attacks we implemented puzzle security with added TESLA properties so that double coverage will be given to security.
Authors and Affiliations
Ugale Pradip, Hemlata Sunhare, Sachin Patel
Implementation of Multinomial Standard Product for RSA State Identify Algorithm
This paper presents architecture and modeling of public key RSA encryption/decryption systems. The RSA(rivest -shamir-adleman)algorithm is a secure, high quality public key algorithm.public key supports confidential...
In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm
In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encry...
A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam
In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then r...
Detecting Misbehaving Node In Ad-Hoc Network By Audit Mechanism
The purpose of this project is to detect misbehaving nodes and isolate them in order to make successful message forwarding in ad-hoc networks. In this project we are trying to find the node which does not forward the...
Analyzing Mel Frequency Cepstral Coefficient for Recognition of Isolated English Word using DTW Matching
In this paper we proposed Mel-frequency cepstrum coefficients feature extraction and Dynamic Time Warping matching algorithm for speech recognition. Feature vector (Mel-frequency cepstrum coefficients) obtained from...