Advanced Secure System For Manet
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 2
Abstract
Mobile Ad Hoc Networks (MANETs) are fundamentally different from their wired-side counterparts. MANETs provide no fixed infrastructure, base stations or switching centers. So there is no security to protect the nodes in the network. Each and every nodes act as a sender and receiver. Each node helps each other to perform network functions in a self organization way. However, some nodes in a network may oppose to cooperating with others to avoid consuming their battery power and other resources. So we propose and implement a new Intrusion detection system called Enhanced Adaptive Acknowledgement (EAACK). EAACK identifies the malicious nodes and improving the performance of the network.
Authors and Affiliations
Sujitha. R
Exergy Analysis of Raipur Thermal Power Plant in Raipur (India); A Case Study
In this paper, the exergy analysis of “(56MW) thermal power plant Raipur (India); a case study” are presented. The main objectives of this paper are to analyze the plant’s component separately and to identify the parts...
IMPLEMENTATION OF POWER EFFICIENT PROGRAMMABLE PRPG USINGBS-LFSR BASED ON BIST
This paper describes a low-power programmable generator with bit swapping technique which is capable ofproducing pseudorandom test patterns with toggle selection(TOSE) , enhanced fault coverage and poweroptimizatio...
Effect of Clipping Ratio on Bit Error Rate Performance of Clipped and Filtered OFDM Signal
Wireless communications is regarded as the most important development with wide range of applications. Advances and development in this field aim for fast and reliable communication. Orthogonal frequency division...
Implementation of Tire Pressure Controlling System for Vehicles
due to the accidents during transport of the vehicle. These are especially due to the flaw in the tire pressure. Tire break avoiding is very important for safe driving in superhighway. So we need a controlling system n...
Simulation and Synthesis for TACIT Network Security in Hardware Description Language Environment
In cryptography, it is necessary to encrypt and decrypt the data for code storage and security. Sometimes it is very difficult to secure physically all access networks. The research paper has introduced a new bloc...