Using 3GPP- A Secure IDS for MANETs
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directly witheach other when they are both within the same communication range else they can propagate message to neighbor nodesto pass the message. A new intrusion detection system named Enhanced Adaptive Acknowledgement (EAACK) speciallydesigned for MANETs. By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite theexistence of false misbehavior report. The results will demonstrate positive performances against Watchdog, TWOACKand AACK in the cases of receiver collision, limited transmission power and false misbehavior report. EAACKdemonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the networkperformances. EAACK is designed based on the Digital signature Algorithm (DSA) and RSA. Those techniques havedrawback due to network overhead. We need techniques for security like encryptions, hybrid encryption or sign encryptionto protect our message.
Authors and Affiliations
Monika Garg, Karanvir Kaur, Simerpreet Kaur
A Comparative Analysis of Feed-Forward and Generalized Regression Neural Networks for Face Recognition Using Principal Component Analysis
In this paper we give a comparative analysis of performance of feed forward neural network and generalized regression neural network based face recognition. We use different inner epoch for different input pattern accor...
Memory Transfer Language: an absolute learner-driven visualizer
This article discusses visualization as a technique to enhance programming comprehension. It points out that current animation approach, being machine-based technique, is inadequate due to the fact that machine-based ani...
Nand gate architectures for memory decoder
This paper presents some nand gate design styles which when used in decoder reduces energy consumption and delay. Basically conventional, nor style nand, source coupled nand is discussed. The three designs conventional,...
SIMULATION AND PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FSR AND ZRP IN VEHICULAR AD-HOC NETWORK (VANET)
Vehicular Ad-Hoc Network (VANET) is a wireless routing network which used ad hoc network system as the basis. VANET was formed to give solution to the unclear network infrastructure or frequently changing network topolog...
Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation
Data mining is a very active research area that deals with the extraction of  knowledge from very large databases. Data mining has made knowledge extraction and decision making easy. The extracted knowledge could reveal...