Sprinkling Data Prevents From Intruders

Abstract

The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mobile nodes communicating through wireless channels lacking of any existing network infrastructure or centralized authority.Some of the most challenging issues in this scenario misbehaviours and burglar detection. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malicious, especially when dealing with many networks or obfuscated malware. In this paper we propose trustable naive Bayesian (TNB)model. It is profitably function for wired networks but not applied for ad-hoc networks. In this paper we address major problem of Manetsmalicious nodes are produce fake estimations. We identify two exclusive challenges on Manets these are phony estimation of trustable node and un-estimated of spam node detection. Furthermore, we dogmatic filtering, and adaptive routing communication in Manets.

Authors and Affiliations

D. V. S Sujitha, S Babu

Keywords

Related Articles

Pattern-Based Text Mining Method For Classification of Research Proposals

Research proposal classification is an important task for private research funding agencies. When a large number of research proposals are received, it is common to group them according to their similarities in resear...

An Interface of Human and Machine with Eye Blinking

Human’s especially handicapped people it is difficult to operate the system. Here is a paper which is used to interface of system and a people with their eye blinking. Here we can find out the eye blinking of any per...

BLIND SOURCE SEPARATION OF PARTIAL AND FULL TRANSPARENCY IMAGE USING IMAGE SEPARATION ALGORITHM

The problem of blind separation of multiple source layers from their linear mixtures with unknown mixing coefficients and unknown layer motions. Such mixtures or Full Transparency or Superimposed image can occur when...

Elimination Of Repeated Data Copies With Enhanced Security In Hcloud

Intending at economically solving the trouble of deduplication with discrepancy privileges in cloud computing we regard as a hybrid cloud structural design consisting of a public cloud and a private cloud. Dissimilar...

Prevention of Routing Attack in Mobile Ad-Hoc Networks: A comparative study

Mobile ad hoc networks (MANET) is a wireless network where nodes work in standalone fashion. The MANET faces various security challenges due to the environment in which it is deployed. The nodes of mobile ad hoc netw...

Download PDF file
  • EP ID EP28155
  • DOI -
  • Views 238
  • Downloads 1

How To Cite

D. V. S Sujitha, S Babu (2015). Sprinkling Data Prevents From Intruders. International Journal of Research in Computer and Communication Technology, 4(3), -. https://europub.co.uk/articles/-A-28155