Minimizing Network Overhead In MANET Using Elliptic Curve Cryptography
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 8
Abstract
In this paper, we propose and implement a new intrusion-detection system with ECC Algorithm specially designed for MANETs. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. Compared to contemporary approaches, EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances. Proposing and implement brand new intrusion detection and prevention system using ECC approach specially designed for MANET. Among all the contemporary wireless networks, Mobile Ad hoc Network is one of the most important and unique applications.
Authors and Affiliations
B. Santhi Sri, C. Subash Chandra, G. Aruna Rekha
Real-Time Face Detection System for Virtual Classroom Environment
In today’s fast paced world where human computer interaction systems are working towards becoming more user-friendly. Face detection has become an integral part of many of these systems. It also has varying range of...
Efficient Techniques For load balancing and dynamic resource management in cloud
Cloud computing applications are developed using MapReduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numbe...
To Measure The Average Delay Experienced By A Subscriber To Connect In An Attribute Tree
Validation of publishers and subscribers is not simple to get due to the loose coupling ofpublishers and subscribers.We also present extensions of the cryptographic methods to proffer capable routing of encrypted eve...
Review on Novel Approach to Filter Unwanted Messages in On-line Social Networks
Nowadays, online social networking websites are used frequently. These websites are known as social sites. Social networking sites works like an online internet users community. Depending on the websites many of these...
Finger Vein Based User Identification Using Differential Box Counting
The personal information can be protected in the form of biometrics which uses human physiological or behavioural features for personal identification. Finger vein ID is a biometric authentication system that matches...