Enhancement in Elimination of Security Threads using Trusted Proactive Routing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 9, Issue 3
Abstract
Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It is possible that eventually a malicious node becomes easy to deploy in ad hoc n/w and they cause among other impact performance degradation. One attack that can deploy by malicious node is black hole attack. This paper reviews the problem of occurrence of black hole attack and its solution technique proposed enhancement in proactive routing protocol Destination Sequenced Distance Vector Routing protocol Using trust based and hop count method.
Authors and Affiliations
Shilpa Jaiswal
Enhanced Message Digest Version 5 Architecture for Secure Hashing
Abstract: The message digest algorithm is a widely used cryptographic hash function. It produces a 128-bit hash value. It has been used in a variety of security applications and is also commonly used to check data...
Data Compression using Multiple Transformation Techniques for Audio Applications
Abstract: As Multimedia Technology is growing day by day over past decades, therefore demand for digital information increasing rapidly. This digital information contains multimedia files like image files, audio files th...
A Review on Concept Drift
Abstract: The concept changes in continuously evolving data streams are termed as concept drifts. It isrequired to address the problems caused due to concept drift and adapt according to the concept changes. Thisca...
Improved Energy Conscious Dynamic Source Routing (I-ECDSR) for Adhoc Networks
Abstract: Adhoc network is a collection of mobile devices that have a capability of organizing themselves into a temporary network. Efficient routing is one of the key challenges in Adhoc networks. In this paper, we prop...
Performance measurement of MANET routing protocols underBlackhole security attack
Abstract: Unlike wired networks or other wireless networks, where the nodes communicate with each other viaan access point or a base station, wireless Mobile ad hoc network is an infrastructure less network where t...