Secure Routing Backup Protocol for MANET from Selective Forwarding Attack
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 8
Abstract
In the recent years, wireless technology has enjoyed a tremendous rise in popularity and usage, thus opening new fields of applications in the domain of networking. One of the most important of these fields concerns mobile ad hoc networks (MANETs), where the participating nodes do not rely on any existing network infrastructure. Self-policing networks such as wireless ad hoc networks face a number of problems to retain trustworthiness and cooperation of the network. Selective forwarding attack is one of the harmful attacks against wireless networks and can affect the whole network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In order to avoid the selective forwarding attack, we proposed a scheme of secure data transmission which can forward the data safely, and detect the selective forwarding attack. We judge the trust value of each node to select a secure path for message forwarding to detect the malicious nodes which are suspected to launch selective forwarding attack.
Authors and Affiliations
Harsh Lohiya , Rajnish Choubey , Roopali Soni
Performance of Appropriate Photovoltaic Model
Energy is very important key to improve human life. Due to the global warming and pollution, the new energy source is developed. Photovoltaic is one of these sources that growth in recent decades and has several models....
An analysis on Stock Market Prediction using Data Mining Techniques
Stock market data analysis needs the help of artificial intelligence and data mining techniques. The volatility of stock prices depends on gains or losses of certain companies. Many people consider stock market predictio...
Cloud Computing Business Advantages for IT Sector
Cloud computing is an efficacious technology to perform massive-scale and complex computing on the go. It terminates the need to maintain immoderate computing hardware, dedicated space, and software. This paper also expl...
Prediction model for bug re-opens in Mozilla Firefox
Bug fixing becomes the most crucial activity in the software development process. Fixing bugs accounts a large amount of time of software development task. Sometimes these bug fixes are incomplete or inappropriate and re...
A novel approach for image classification in Content based image retrieval using support vector machine
Image is a collection of row and column that is called pixel values. Extracting best matched image from large collection of database is emerging task. Image retrieval is mainly used in image processing, pattern recogniti...