Network Layer Attacks: Analysis & Solutions, A Survey
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract - An ever-existing concern is the lack of security due to the very fact that the technology is wireless and is vulnerable to security threats & attacks. Also, among the wide-spread characteristics of a CR, selforganized security management is one of prime considerations. Each layer in cognitive radios is susceptible to widespread threats and security attacks. The scope of this paper reveals a detailed tabulation of the possible security threats/attacks faced by cognitive radios & cognitive radio networks in the Network layer, along withthe current state-of-the-art to detect the corresponding attacks and discuss the possible countermeasures for the same. The paper makes an attempt to effectively survey the existing detection techniques as well as counter measures relevant to Network layer attacks
Authors and Affiliations
Shruthi N , C K Vinay
Role of Virtual Machine Live Migration in Cloud Load Balancing
Cloud computing has touched almost every field of the life. Hence number of cloud application consumers is increasing every day and so as the number of application request to the cloud provider. This leads ...
A Review: Hadoop Storage and Clustering Algorithms
Abstract : In the last few years there has been voluminous increase in the storing and processing of data, which require convincing speed and also requirement of storage space. Big data is a defined as large, diverseand...
An Optimized and Secured Ranking Approach for Retrieving Cloud Data Using Keyword Search
Abstract: Cloud computing is a versatile technology that emerged as a solution to reduce costs in organizations by providing on-demand high quality applications and services from a centralized pool of configurable comput...
Next Generation Genetic Algorithm for Maximum Clique Problem
Abstract: Given a graph, in the maximum clique problem, one desires to find the largest number of vertices, any two of which are adjacent. A branch-and-bound algorithm for the maximum clique problem—which is comput...
Reduced Overhead Based Approach for Secure Communication in Mobile Ad Hoc Network
Abstract: Mobile ad hoc network (MANET) is an infrastructureless mobile networks where nodes can freely move and join. MANET has attracted much attention in recent years owing to the increased focus on wireless communica...