Secure Routing Backup Protocol for MANET from Selective Forwarding Attack
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 8
Abstract
In the recent years, wireless technology has enjoyed a tremendous rise in popularity and usage, thus opening new fields of applications in the domain of networking. One of the most important of these fields concerns mobile ad hoc networks (MANETs), where the participating nodes do not rely on any existing network infrastructure. Self-policing networks such as wireless ad hoc networks face a number of problems to retain trustworthiness and cooperation of the network. Selective forwarding attack is one of the harmful attacks against wireless networks and can affect the whole network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In order to avoid the selective forwarding attack, we proposed a scheme of secure data transmission which can forward the data safely, and detect the selective forwarding attack. We judge the trust value of each node to select a secure path for message forwarding to detect the malicious nodes which are suspected to launch selective forwarding attack.
Authors and Affiliations
Harsh Lohiya , Rajnish Choubey , Roopali Soni
Efficient Speech Recognition System for Isolated Digits
In this paper, an efficient speech recognition system is proposed for speaker-independent isolated digits (0 to 9). Using the Weighted MFCC (WMFCC), low computational overhead is achieved since only 13 weighted MFCC coef...
A Novel Approach to Recognize the off-line Handwritten Numerals using MLP and SVM Classifiers
This paper presents a new approach to off-line handwritten numeral recognition. Recognition of handwritten numerals has been one of the most challenging task in pattern recognition. Recognition of handwritten numerals po...
Query Optimization in Object-Oriented Database Management Systems: A short review
Object-oriented database systems began developing in the mid-80’s out of a necessity to meet the requirements of applications beyond the data processing applications which were [are] served by relational database systems...
A Novel Method to Extract Comparison of Products Using Comparative Questions
Comparing one thing with another is a typical part of human decision making process, especially during an online purchase scheme. To assist decision making it is useful to compare entities that share common utility but h...
A Prototypical Solution for Cyber Space
Many things have been written and told about cyber security and its importance around the world during these recent years. To establish Secure Cyber Space an effective communication network is needed. The cognitive netwo...