Management of Secure IDS for Mobile Ad-Hoc Network
Journal Title: Engineering and Scientific International Journal - Year 2014, Vol 1, Issue 1
Abstract
— In the modern world, mobile ad-hoc networks are consider as very popular research area. MANET is one of the important and unique applications in this field. The mobility and scalability brings by wireless networks are common and it possible in various applications. Mobile adhoc network does not require a fixed network infrastructure and here every single node work as both transmitter and receiver. When the nodes are within the same communication range they communicate directly with each other. This approach is an important factor in many service oriented applications. In this type, the system overcomes so many security issues through intrusion detection methodology.
Authors and Affiliations
B. Reddy Sumanth
Efficient Energy Management and Communication Technique in Smart Cities using Internet of Things
Nowadays, Internet of things becomes wider to make efficient energy. Internet is the backbone of internet of things. In this paper, we discuss how to use energy management and communication technologies in smart cities u...
Optimal sitting and sizing of Distributed Generation
Matlab is one the important programming stream and consider as hottest research area now a day’s, this area has very vast application in real world. Efficient methods and technologies are highly required to this world to...
Residual Stresses in Machining: A Review
The most challenge is considered in Aviation industries is milling part features from prismatic blocks to part features by means of floor and wall thicknesses is very comparable to sheet metal assemblies. The distortion...
An Effective Implementation of HTML Injection
HTML injection is an attack that is closely related to Cross- site Scripting (XSS). The difference is not in the vulnerability, but in the type of attack that leverages the vulnerability. Hypertext Markup Langua...
Improving Iris Performance using Segmentation with CASIA Database
We can recognize humans each other according to their numerous characteristics of age. Identity verification (authentication) in computer systems has been traditionally based on something like password, key, card, pin an...