User Selective Encryption Method for Securing MANETs
نویسندگان
چکیده
منابع مشابه
Securing Iris Templates using Double Encryption Method
The important aspect of all verification system is authentication and security. This aspect necessitates the development of a method that ensures user security and privacy. The traditional methods such as tokens and passwords provide security to the users. Uncertainly, the attackers can easily compromise these techniques. In recent years, the combination of biometrics and cryptography technique...
متن کاملSecuring MANETs by Q Routing Protocol
MANETs is a infrastructure less network in which all the nodes are move independently so there are lot of chance for unsecure the network..for securing the adhoc network we have different-different routing protocols such as AODV, DSR, OLSR, SAR , SRP and Ariadne. And to allow comparison of these secure protocol there is a single common routing protocol i.e. Q Routing. Our contribution in this w...
متن کاملSecuring AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) are frequently established in insecure environments, which make them more vulnerable to attacks. These attacks are initiated by sharing malicious nodes against different services of network. The binding force in these...
متن کاملA generalized intrusion detection & prevention mechanism for securing MANETs
Most of the research in securing Mobile ad hoc networks (MANETs) has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole and rushing attacks. In this paper we broaden our previously develop algorithm AIDP and propose a generalized intrusion detection and prevention mechanism. We use a combination of anomalybased and knowledge-...
متن کاملSecuring graphical user interfaces
ion such as a widget set including buttons, menus, and other basic GUI elements. Performing the transformation of each client’s representation to pixels locally enables the GUI server to predict all graphical primitives that are needed for any screen update and, as a consequence, to estimate overall execution times of redrawing jobs in advance of execution. The sequence of graphical primitives ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2018
ISSN: 2088-8708,2088-8708
DOI: 10.11591/ijece.v8i5.pp3103-3111