User Selective Encryption Method for Securing MANETs

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Iris Templates using Double Encryption Method

The important aspect of all verification system is authentication and security. This aspect necessitates the development of a method that ensures user security and privacy. The traditional methods such as tokens and passwords provide security to the users. Uncertainly, the attackers can easily compromise these techniques. In recent years, the combination of biometrics and cryptography technique...

متن کامل

Securing MANETs by Q Routing Protocol

MANETs is a infrastructure less network in which all the nodes are move independently so there are lot of chance for unsecure the network..for securing the adhoc network we have different-different routing protocols such as AODV, DSR, OLSR, SAR , SRP and Ariadne. And to allow comparison of these secure protocol there is a single common routing protocol i.e. Q Routing. Our contribution in this w...

متن کامل

Securing AODV for MANETs using Message Digest with Secret Key

Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) are frequently established in insecure environments, which make them more vulnerable to attacks. These attacks are initiated by sharing malicious nodes against different services of network. The binding force in these...

متن کامل

A generalized intrusion detection & prevention mechanism for securing MANETs

Most of the research in securing Mobile ad hoc networks (MANETs) has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole and rushing attacks. In this paper we broaden our previously develop algorithm AIDP and propose a generalized intrusion detection and prevention mechanism. We use a combination of anomalybased and knowledge-...

متن کامل

Securing graphical user interfaces

ion such as a widget set including buttons, menus, and other basic GUI elements. Performing the transformation of each client’s representation to pixels locally enables the GUI server to predict all graphical primitives that are needed for any screen update and, as a consequence, to estimate overall execution times of redrawing jobs in advance of execution. The sequence of graphical primitives ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)

سال: 2018

ISSN: 2088-8708,2088-8708

DOI: 10.11591/ijece.v8i5.pp3103-3111