Security in MANET Against DDoS Attack
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 1
Abstract
Mobile ad-hoc network is a group of two or more devices or nodes with the capability of communication and networking. It is an infrastructure less network. Such network may operate by them or may be connected to a larger internet. Due to its mobility and self routing capability nature, there are many weaknesses in its security. The security of the network from various attacks is an important issue in MANET application now days. Due to the dynamically changing topology, open environment and lack of centralized security infrastructure, a mobile ad hoc network (MANET) is vulnerable to many attacks. This paper focuses on mobile ad hoc network's routing vulnerability and analyzes the network performance under Distributed Denial of Service MANETS. The resistive schemes against these attacks were proposed for Ad hoc on demand Distance Vector (AODV) routing protocol and the effectiveness of the schemes is validated using NS2 simulations.
Authors and Affiliations
V. K aviyarasu , S. Baskaran
Image Search Reranking
The existing methods for image search re ranking suffer from the unfaithfulness of the as sumptions under which the text-based images search result. The resulting images contain more irrelevant images. Hence the re ranki...
Review of MANETS Using Distributed Public-key Cryptography
Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumpt...
Journey from Data Mining to Web Mining to Big Data
This paper describes the journey of big data starting from data mining to web mining to big data. It discusses each of this method in brief and also provides their applications. It states the importance of mining big dat...
An Efficient Classification Approach for Novel Class Detection by Evolving Feature Datastreams
Data stream classification has been an extensively studied research problem in recent years. data stream classification requires efficient and effective techniques that are significantly different from static data classi...
An Adaptive Log Based Realtime Network Scans in LAN
Network scans really are a common initial step within a network intrusion attempt. As a way to gain details about a possible network intrusion, it can be beneficial to analyze these network scans. Scanning activity is na...