A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kiruthika, R.
- A New Security Measure for Black Hole Attack in MANETS for Green Computing
Authors
1 Sankara College of Science and Commerce, Coimbatore, IN
Source
Biometrics and Bioinformatics, Vol 5, No 4 (2013), Pagination: 139-139Abstract
A Mobile Ad-hoc Network (MANET) is a dynamic wireless network that can be formulated without the need for any pre-existing infrastructure in which each node can act as a router. One of the main challenges of MANET is the design of robust routing protocol that adapt to the frequent and randomly changing network topology. A variety of routing protocols have been proposed and most of them have been extensively simulated or implemented as well. Several attacks are possible in the available routing protocols such as Wormhole attack, black hole attack, byzantine attack, etc. Among these attacks black hole attack is of major concern in AODV, is one of the popular routing protocols for MANET. Due to security vulnerabilities of the AODV routing protocol, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack. In this study, analyzed the use of AOMDV (Ad-hoc On-demand Multipath Distance Vector) and improved the security of MANET against the black hole attack. The main objective is to provide security against the Black hole attack. Finally compared and evaluated the performance of On-demand routing protocols- Ad-hoc On-demand Distance Vector (AODV) routing protocol, which is unipath and Adhoc On-demand Multipath Distance Vector (AOMDV) routing protocol. When compared to the existing AODV protocol, AOMDV has better packet delivery ratio and comparatively low average end-to-end delay. The number of packets dropped in the AOMDV against the black hole attack is very low. Thus the proposed technique which uses AOMDV is proved to be better against black hole attacks.- Multicast Verification Based on XML Signature
Authors
1 Department of Computer Science, Rathinam College of Arts and Science, Coimbatore, IN
Source
Biometrics and Bioinformatics, Vol 10, No 4 (2018), Pagination: 78-80Abstract
Multicast authentication based on xml signature described the present network of prime language XML in network applications introduce its own XML language features and development to demonstrate aspects of XML knowledge in the application of network security and significance. The network security is a systems engineering which is need to carefully consider the security needs of the system, and a variety of security technologies, such as passwords and technology combine to produce a highly efficient, universal, secure network systems. Secondly, this paper analysis of network security architecture and the current network security system for the protection of technical methods used: the network against viruses, configuration, firewall, intrusion detection systems used, Web, Email, BBS's safety monitoring system, vulnerability scanning systems, IP Theft solution, using network monitoring to maintain system security subnet. Finally, the XML technology for network security enabled areas of security, XML has become a field for the safety of a valuable mechanism for exchange of data, related development is related to XML encryption and XML signature.
Keywords
Network Security, Expansion, System, Method, Enable.References
- Zhou jing.” the Exploration of Data Transfer Mode between ASP and ASP.NET Page”[J]. Microcomputer Information20065-3 pp. 114-115.
- Zhou jing liu quanju. “The System Safety Research and Design based on .NET Framework”[J].Communication Technology.2008-5.
- Wei-yuxin. Network Invasion Examination System Key Technologies Research [D]. Beijing University of Posts and Telecommunications doctorate paper.2008.
- Jing, Zhou,Yuan, Fang.” The component code of each call analyze and compare based on .NET”. Proc. Int. Symp. Intelligent Inf. Technol. Appl., IITA2009, (EI 20101012756764), IEEE Computer Society press,10.1109/IITA.2009.60
- WangWenLong. Asp.net Techniques [M]. Beijing: people's press, 2005.
- YangKunPeng, MengFanQi, WenCai Inflammation. Asp.net + SQL SERVER Dynamic Web Development from the Foundation to Practice [M].beijing: Electronic Industry Press, 2005.
- ChuYue, “Asp.net Application Security Flaws and Prevention Strategies” [J]. Journal of Anhui: Anhui. 2007.