Security enhancement using CHAP in MANET

Gurinderjit Kaur

Abstract


MANET is a collection of mobile devices and is self configuring, dynamically changing, multi-hop wireless network which forms a communication network via multi hop wireless network connection, it is a self-organizing network, without any central control. Nodes in the network communicate with another node only if it lies within its transmission range.. Every routing protocol has some advantages and disadvantages. The research focuses on two routing protocols AODV and DSDV that are discussed earlier. Both protocols belong to different categories of routing protocol. AODV is a reactive and DSDV is proactive protocol. In this paper we define the following objectives of the research to Analyze Performance under Flood Attack under AODV & to Improve the performance of AODV under Flood Attack

Full Text:

PDF

References


Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, DieudonneMulamba, MariappanRajaram “Secure Logging

As a Service—Delegating Log Management to the Cloud” IEEE SYSTEMS JOURNAL, VOL. 7, NO. 2,

JUNE 2013

[2] U.S. Department of Health and Human Services. (2011, Sep.). HIPAA—General Information [Online].

Available: https://www.cms.gov/hipaageninfo

PCI Security Standards Council. (2006, Sep.) Payment Card Industry (PCI) Data Security Standard—

Security Audit Procedures Version 1.1 [Online]. Available: https://www.pcisecuritystandards.org/pdfs/

pci−audit−procedures−v1-1.pdf

Sarbanes-Oxley Act 2002. (2002, Sep.). A Guide to the Sarbanes-Oxley Act [Online]. Available:

http://www.soxlaw.com/

C. Lonvick, The BSD Syslog Protocol, Request for Comment RFC 3164, Internet Engineering Task Force,

Network Working Group, Aug. 2001.

D. New and M. Rose, Reliable Delivery for Syslog, Request for Comment RFC 3195, Internet Engineering

Task Force, Network Working Group, Nov. 2001

B. Schneier and J. Kelsey, “Security audit logs to support computer forensics,” ACM Trans. Inform. Syst.

Security, vol. 2, no. 2, pp. 159–176, May 1999.

J. E. Holt, “Logcrypt: Forward security and public verification for secure audit logs,” in Proc. 4th

Australasian Inform. Security Workshop, 2006, pp. 203–211.

Vol-2 Issue-1 2016 VNN Publishers

http://vnnpublishers.com 7

R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The secondgeneration onion router,” in Proc. 12th

Ann. USENIX Security Symp., Aug. 2004, pp. 21–21.

The Tor Project, Inc. (2011, Sep.) Tor: Anonymity Online [Online]. Available: http://www.torproject.org

D. Dolev and A. Yao, “On the security of public key protocols,” IEEE Trans. Inform. Theory, vol. 29, no.

, pp. 198–208, Mar. 1983.

A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.

G. R. Blakley, “Safeguarding cryptographic keys,” in Proc. Nat. Comput. Conf., Jun. 1979, p. 313.

R. Ostrovsky and M. Yung, “How to withstand mobile virus attack,” in Proc. 10th Ann. ACM Symp.

Principles Distributed Comput., Aug.1991, pp. 51–59.

A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, “Proactive secret sharing or: How to cope with

perpetual leakage,” in Proc. 15th Ann. Int. Cryptology Conf., Aug. 1995, pp. 339–352.

Neha Gohar Khan Prof. V. B. Bhagat, An SystematicOverview On Cloud Computing and Load Balancing

inthe Cloud, ISSN: 2278-0181 Vol. 2 Issue 11, November- 2013

Bin Fan, Hyeontaek Lim, David G. Andersen, Michael Kaminsky, Small Cache, Big Effect:Provable

Load Balancing for Randomly Partitioned Cluster Services,

http://www.cs.cmu.edu/~hl/papers/loadbalsocc2011.pdf.

Wilhelm Kleiminger, Evangelia Kalyvianaki, Peter Pietzuch, Balancing Load in Stream Processing with

the Cloud,http://www.vs.inf.ethz.ch/publ/papers/Wilhelm%

Kleiminger-balanc-2011.pdf


Refbacks

  • There are currently no refbacks.


Copyright (c) 2016 VNN Journal of Computers & Technology

sofia pro fontDesign & Maintained By Ruler Dynasty InfoTech Pvt Ltd