Enhanced Security Key Management Scheme for MANETS
|
|
|
- Bethany Banks
- 10 years ago
- Views:
Transcription
1 Enhanced Security Key Management Scheme for MANETS EDNA ELIZABETH.N, SUBASREE.S, and S.RADHA Electronics and Communication Engineering Deartment Sri Sivasubramaniya Nadar College of Engineering Kalavakkam, Chennai INDIA Abstract: - (MANET) Mobile Ad hoc Network is a collection of wireless infrastructure less network. The toology of the network changes continuously. Due to the dynamic structure of MANETs, they are rone to various tyes of attacks. The traditional security solutions for MANETs are inadequate, hence security should be maintained at all the levels. To enhance security various schemes have been roosed. In this article the security is rovided by two schemes namely the ellitic curve crytograhy and the digital signature algorithm. Various oints are generated from the ellitic curve of rime field and a oint is chosen at random as a secret key. The ublic key generation centre forms the secured channel for transmitting the secret key to all the users in the MANET. Now the secret key to be shared is encryted using the RSA algorithm. The keys before sending and receiving must be signed by the sender and verified by the receiver thereby authenticating each other. The encryted secret key is concatenated along with the signature air key and is sent through the secured channel. Thus the security is enhanced at various levels which revent strong malicious attacks. Key-Words: - HADS (Hash Asymmetric Digital Signature), ECC (Ellitic Curve Crytograhy), DSA (Digital Signature Algorithm), BHA (black hole Attack). 1 Introduction MANET (Mobile Ad hoc Network) is a wireless infra-structure less network. It is dynamic in structure which changes its toology frequently according to its needs. Thus it is rone to various tyes of attacks. The attacks in MANETS are due to their oen medium, absence of fixed or central structure, dynamically changing toology, constrained caability etc. Security goals such as integrity, authenticity, non-reudiation, rivacy etc., have to be considered in MANETS [1]. This can be achieved only by using a secured channel between the sender and the receiver. Hence forward secrecy and backward secrecy has to be maintained. Forward secrecy is nothing but when the member leaves the grou, the member should not hear further conversations in the grou. Similarly backward secrecy refers to that when a new member joins the grou, the member should not be able to access the revious conversations in that grou [1]. Many encrytion and key sharing techniques are imlemented in MANETs. The levels in nodes and the secured channel for key exchange are formed by using ECC, IBE (Identity Based Encrytion) and Shamir s (t,n) threshold crytograhy []. In this article, to enhance security for routing, ECC along with hashing function, DSA, and RSA are imlemented instead of using IBE as mentioned in []. The aer [18] has imlemented NRMT (Neighborhood Route Monitoring Table) algorithm that does not comare with any other secured rotocol. Our results are comared with the NRMT rotocol [18] in the resence of black hole attack. Our results show better erformance in terms of acket delivery ratio, end to end delay and overhead. Related Works Wan An Xiong, et, al [] [011] discusses about Ellitic curve Crytograhy, Identity based Crytograhy and Shamirs (t,n) threshold crytogray. Nonlinear air comutation is alied to realise secure key management and communication. Shamirs (t,n) threshold crytograhy is used to build three level security in ad hoc network. This scheme can be alied to dynamic tology and different sizes of ad hoc network. This scheme does not require any E-ISSN: Volume 13, 014
2 certificate management. It can get a high security with few traffic and comutation. It does not give any simulation roofs. Also the three level toology can be relaced by SRT [17] that uses simle toology with reduced overhead. Maria Celestin Vigila S, et, al [3] [009] discusses the imlementation of text based Ellitic Curve Crytosystem. Each character in the message is reresented by its ASCII value. Each of these ASCII value is transformed into an affine oint on the EC, by using a starting oint called Pm. Transformation of the laintext ASCII value by using an affine oint is one of the contributions of this work. The urose of this transformation is two folds. Firstly a single digit ASCII integer of the character is converted into a set of co-ordinates to fit the EC. Secondly the transformation introduces non-linearity in the character thereby comletely camouflaging its identity. This transformed character of the message is encryted by the ECC technique. Decrytion of ECC encryted message is itself quite a formidable task, unless we have knowledge about the rivate key 'nb',the secret integer 'k' and the affine oint Pm. These advantages are articularly beneficial in alications where bandwidths, rocessing caacity, ower availability or storage are constrained. Such alications include chi cards, electronic commerce, web servers and cellular telehones. One of the alications that the ECC can be used for is encrytion of large image files. The selection of the rimes and the faster multilication and doubling algorithms are the focus of research, the image encrytion using ECC is comletely a new domain and has tremendous scoe of research. Durgesh Wadbude, et al, [4] [01] rooses an aroach that uses imroved security mechanisms to introduce in the roosed techniques so that it satisfies the main security requirement and guarantees the discovery of a correct and secure route. The security mechanisms that the rotocol uses are the hash chain, digital signature and the Protocol Enforcement Mechanism. The erformances of these two rotocols (SAODV and ARAN) were tested in simulation and their communication costs were measured using the NS- simulator, which is suitable for the resent urose. The evaluation metrics used are overhead and end to end delay. In roosed scheme along with digital signature and hash chain ECC oints are used for generation of secret key Prakash Kuuswamy, et al, [5] [01] rooses method of Digital Signature Scheme based on the linear block ciher or Hill ciher. It is basically symmetric key algorithm. Digital Signatures can rovide added assurances of the evidence to identity, and status of an electronic document as well as acknowledging informed consent and aroval by a signatory. But this method is a conventional method Bin Sun et al, (009) [6] analyses three layered key management architectures to Mobile Ad hoc networks (MANET) with three-layered virtual infrastructure. Two kinds of three layered key management architectures are introduced. The communication efficiency of them has been analysed. It also shows that the communication cost of the three-layered key management schemes is always smaller than that of the two layered ones. These two conditions can be used to otimize the MANET virtual infrastructure rotocol. It also shows that the communication cost of the threelayered key management schemes is always smaller than that of the two-layered ones. Fiat A et al, (1999) [7] roved the signature and identification scheme which enables the user to rove the identity and the authenticity of the message to other users without shared or ublic keys. This scheme is secure against any known or chosen message attack. It is very simle and secure and it is suited for microrocessor devices. Menezes A et al, (1991) [8] analyses the reduction of the ellitic curve logarithm roblem to the logarithm roblem in the multilicative grou of an extension of the underlying finite field. Haiyun Luo et al, (004) [10] analyses ticket certification services through multile node consensus and fully localized instantiation. It uses tickets to identify and grant network access to wellbehaving nodes. In URSA, no single node monoolizes the access decision or is comletely trusted. Instead, multile nodes jointly monitor a local node and certify its ticket. Exerimental and simulation results are analyzed for various arameters. Jin-Hua Hong et al, (009) [1] imlements Ellitic Curve Crytograhy on GF ( 163 ) using olynomial at the base. The encrytion and decrytion is imlemented on the ECC chi, which needs fast oeration and low hardware resources. Gaga dee et al, (01) [13] and Nishu Garg et al, (009) [9] focuses the various tyes of attacks on various layers under rotocol stack. Different tyes of attacker attemts different aroaches to decrease the network erformance, throughut. In this aer the rincial focus is on routing and security issues associated with mobile ad hoc networks which are required in order to rovide secure communication. On the basis of the nature of attack interaction, the attacks against MANET may E-ISSN: Volume 13, 014
3 be classified into active and assive attacks. Attackers against a network can be classified into two grous: insider and outsider. Whereas an outsider attacker is not a legitimate user of the network, an insider attacker is an authorized node and a art of the routing mechanism on MANETs. Himadri Nath Sahaet al, (011) [14] rooses a rotocol for detecting flooding, black hole, gray hole and blackmail attacks and taking measures against the nodes committing them. This scheme is based on a concet of an underlying backbone network of administrator nodes that we assume to be trustworthy and honest throughout. These administrators have greater transmission and recetion range than the general nodes in the MANET and have the ower to take corrective actions on the basis of the reorts sent by the other nodes. The association of these administrator nodes is dynamically increased to ensure better network coverage by ugrading certain general nodes to become administrators subject to certain constraints such as the transmission and recetion range and the erformance over a sufficiently large eriod of time. Mamatha G.S, et al, (010) [15] imlements the identification and revention of malicious nodes launching acket droing and message tamering attacks, using a semantic security mechanism. This security scheme is highly imossible to break, thereby making it a highly secured aroach. The evaluation results demonstrate that the aroach effectively detects and revents such nodes and links in networking sessions. All the above schemes rovides security for the network, but the roosed scheme enhances the security to a higher level by introducing ECC for key generation, RSA for encrytion and decrytion, and digital signature scheme with hash function for securely transferring the key to the users in the network with reasonable overhead. 3 Proosed Security and Key Management Scheme This article uses EC oints for choosing the secret key, and then Lagrange interolation for sharing the secret key. 3.1 Ellitic Curve Crytograhy Ellitic curve crytograhy (ECC) is an aroach to ublic-key crytograhy based on the algebraic structure of ellitic curves over finite fields [1]. Ellitic curves are always cubic. ECC is defined over the ellitic curve 3 ( x + ax+ b) mod y mod = (1) 3 3 Where( 4a + 7 b ) mod 0 For two distinct oints P= (x, y ) and Q= (x q, y q ) that are non-negatives of each other, the sloe of the line l that joins them is given below [10] yq y = () x x q There is exactly one other oint where l intersects the ellitic curve, and that is the negative of the sum of P and Q. After some algebraic maniulation the sum R=P+Q is given by, 3x + a x r y = x (3) 3x + a and yr = ( x xr) y y The oint can be able to be added itself by considering P+P=P=R. When y 0, the (4) exressions are, x = x x (5) y r r q ( x x ) = y + (6) r A key exchange between users A and B can be accomlished as follows, Ste1: A selects an integer na less than n. This is A s rivate key. A then generates a ublic key P A = na*g; the ublic key is a oint Eqn (a, b). Ste: B similarly selects a rivate key nb and comutes a ublic key P B. It obtains the secret key K=nA*P B. B generates the secret key K=nB*P A Similarly the encrytion and decrytion can be obtained by the following An encrytion/decrytion system requires a oint G and an ellitic grou Eqn (a,b) as arameters. Each user A selects a rivate key na and generates ublic key P A =na *G. To encryt and send a message P m to B, A chooses random ositive integer k and roduces the ciher text Cm consisting of the air of oints. C = kg, P + kp (7) m m B To decryt the ciher text, B multilies the first oint in the air by B s secret key and subtracts the result from the second oint. m b B ( kg) = m+ k( nbg) nb( kg) m + k n = (8) E-ISSN: Volume 13, 014
4 A has masked the message P m by adding kp B to it. No one excet A knows the value of k, so even though P B is a ublic key, nobody can remove the mask kp B. However, A also includes a clue, which is enough to remove the mask if one knows the rivate key nb. For an attacker to recover the message, the attacker would have to comute k given G and kg, which is assumed hard in ellitic curve crytograhy [1] Lagrange Interolation Formula The secret key is shared among the users by using the Lagrange interolation formula [3]. It is the N th degree olynomial aroximation formula to the function f(x) and the N th degree olynomial aroximation assing through (N+1) oints. The coefficients of an unknown olynomial f(x) of degree less than t, defined by oints (x i,y i ), 1 i t, are given by the Lagrange interolation formula t x x j f( x) = yi. (9) x x i 1 1 j t j i i Since f(0)=a 0 =S, the shared secret may be exressed as: t x j s= c i. yi, where ci = x x I= 1 j 1 j t i j (10) Each grou member may comute S as a linear combination of t shares y i. Since the c i are nonsecret constants. It means that for a fixed grou of t, users may be re-comuted. So the secret key is shared among the users by comuting the values of f(0), f(1),f() etc.. An ellitic curve is chosen and various oints are generated from the curve. A secret key is chosen and it is shared among the users by using the generated oints of the ellitic curve. The secret key can be retrieved if there is no intruder between the users. The key shared among the users has to be encryted while transmitting at the sender end and the receiver retrieves it using the Lagrange interolation formula. Thus the secret key is shared among the users. 3. Secured Channel in MANET. The key generated using ECC is now shared among the users through a secured channel. Hence for this urose Hash algorithm, encrytion and decrytion using RSA and Digital signature scheme are used. This scheme is called HADS scheme that enhances security Hashing Algorithm The MD5 message-digest algorithm is a widely used crytograhic hash function that roduces a 18-bit (16-byte) hash value. An MD5 hash is tyically exressed as a hexadecimal number, 3 digits long. MD5 rocesses a variable-length message into a fixed-length outut of 18 bits. The inut message is broken u into chunks of 51-bit blocks (sixteen 3-bit words); the message is added so that its length is divisible by 51 [1]. The ublic key generation center forms the secured channel in the MANET. P PKG - Public key of the ublic key generation center. S PKG - Private Key of the ublic key generation center. G - Generator from the ellitic curve. P PKG = S PKG x G A-user or node A, B-user or node B When a set of nodes are ready to form a MANET, they authenticate and communicate with each other with the hel of ublic key and rivate key. Let us consider that node A wants to communicate with the node B. The ublic key of node A can be calculated by the formula Q A =h 0 (ID A ) where, Q A - ublic key of A ID A - identity of node A h 0 - hash function The rivate key if A can be calculated as S A = S PKG X Q A S A -rivate key of A The sender calculates the following, to send the secret key through the secured channel. It randomly selects a oint x q from the ellitic curve and then selects a key from the ellitic curve as k q = (x q, y q ) K q - secret key (x q, y q ) - Points on the ellitic curve Then it calculates r b = m yq. The key is concatenated with the r b m - Message or Secret key r b - is a variable for assigning the value of m. The message m is concatenated with the value of r b which is given by (r b m). E-ISSN: Volume 13, 014
5 3... Encrytion and Decrytion using RSA The RSA scheme is a block ciher in which the lain text and ciher text are integers between 0- n-1 for some n. The stes for encrytion and decrytion are as follows [1] Ste 1: select two rime s and q. Ste : calculate n= xq Ste 3: calculate Ø (n) = (-1) (q-1) Ste 4: select e such that e is relatively rime to Ø (n). Ste 5: calculate d such that d= mod (Ø (n)) Ste 6: calculate c ; C = M e mod n Ste 7: calculate M = C d mod n. Thus the obtained key is encryted by using the RSA algorithm to send through the channel and finally it is digitally signed by using digital signature algorithm which is discussed in section below Digital Signature Scheme A digital signature is an authentication mechanism that enables the creator of a key to attach a code that acts as a signature. The signature is formed by taking the hash of the key and encryting the key. The signature guarantees the source and integrity of the key. The signing of a key is done by the rivate key of the user A [1]. For this urose Ellitic Curve Digital Signature algorithm is adoted for signing a message m by sender S using A s rivate key, S A. In this article the message is the secret key. So the concatenated and encryted messages along with the values of r and s signature air keys are sent through the channel. The receiver must decryt and deconcatenate the message and does the verification rocess. The stes are as follows. Ste 1: e= h (m) Ste : select a random integer k from [1 n-1] Ste 3: calculate r =x1(mod n) Ste 4: s = (1/k)(e + SA x r)(mod n). The signature air is (r, s). The stes of verification for user B to authenticate user A are as follows, Ste 1: Verify whether r, s are in [1, n-1] Ste : Calculate e= hash (m) Ste 3: Calculate w=(1/s)(mod n) Ste 4: u1 = e x w (mod n) & u = r x w (mod n) Ste 5: Calculate (x1, y1) = u1x G + u x QA Ste 6: The signature is valid if x1 = r (mod n). Thus the signature is authenticated and verified. 4 Simulation Results Simulation is erformed using NS- tool for the roosed HADS algorithm in the AODV rotocol [11] with and without the resence of black hole attack. The erformance metrics such as end to end delay, acket delivery ratio, throughut and overhead are analyzed and obtained. The simulation arameters are tabulated. Simulation Time Table1 Simulation arameters 0 minutes Terrain Area 750X750 m Number of Nodes 100 Node Strategy Placement Proagation Model Mobility Model Network Protocol Routing Protocol Random Two-Ray Model Random way oint MAC/80-11 AODV 4.1 End to End Delay End-to-end delay is defined as the time taken for a acket to be transmitted across a network from source to destination. It involves rocessing delay, queuing delay etc. By varying the number of nodes from 0 to 0, with the black hole attack the delay obtained is greater. On alying the HADS scheme in the RREQ and RREP acket of each transmission and recetion, the delay obtained is very less. Similarly by varying the nodes to 50 and 100, the delay obtained is less, which imlies that, for any number of nodes the delay in HADS scheme is lesser comared to with BHA. It is observed that the delay obtained is 68% less for 0 nodes, 60% less for 50 nodes, and 61% less for 100 nodes. This shows that the robability of attack is less by alying HADS scheme which is shown in fig 4.1, fig 4. and fig 4.3 E-ISSN: Volume 13, 014
6 Fig.4.1 Number of nodes (0) vs. end to end delay (milliseconds) 4. Packet Delivery Ratio Packet delivery ratio is defined as the ratio number of ackets received to the number of ackets sent. If there is a black hole attack there will be loss of ackets at each transmission and recetion, hence there will be loss of information. On alying the HADS scheme, the information before receiving and sending is comletely authenticated and verified. Hence there is no way of losing the information. So the number of ackets sent and received is same without any loss. So the acket delivery ratio is more when comared to other schemes. By considering 0, 50, 100 nodes the acket delivery ratio obtained is more. So for any number of nodes the acket delivery ratio is more. This is shown by fig 4.4, fig 4.5, and fig 4.6. It is observed that the acket delivery ratio in the resence of black hole attack is less. After alying the HADS scheme the acket delivery ratio is increased by 0 % for 0 nodes, 1 % for 50 nodes and 1% for 100 nodes. This shows that HADS scheme eliminates the black hole attack. Fig.4. Number of nodes (50) vs. end to end delay (milliseconds) Fig. 4.4 Number of nodes (0) vs. acket delivery ratio Fig.4.3 Number of nodes (100) vs. end to end delay (milliseconds) E-ISSN: Volume 13, 014
7 Fig. 4.5 Number of nodes (50) vs. acket delivery ratio Fig. 4.7 Number of nodes (0) vs. overhead Fig. 4.6 Number of nodes (100) vs. acket delivery ratio 4.3 Overhead Overhead is the amount of resources lost in the network and due to the comutational comlexities. In the resence of black hole attack the overhead is more. But in HADS scheme though mathematical comutations are included in HADS scheme overhead is reduced and is lesser comared to with BHA. On varying the number of nodes 0, 50 and 100, the overhead is obtained as 10%, 11 %, 10% lesser comared to with BHA. This is shown in the figures 4.7, 4.8, and 4.9 Fig. 4.8 Number of nodes (50) vs. overhead Fig 4.9 Number of nodes (100) vs. overhead E-ISSN: Volume 13, 014
8 fff WSEAS TRANSACTIONS on COMMUNICATIONS 4.4 Throughut The number of attackers is increased in each stage and the throughut and delay are analysed. Throughut is calculated as the ratio of the outut in bits to the difference in time of the first acket sent and the last acket received. It is measured in bits er second. On alying the HADS scheme the throughut obtained is greater and the delay obtained is comaratively less. This can be shown in the fig 4.10 and fig From the simulation results it is observed that throughut with HADS increases by 10%, delay decreases by 0% by increasing the number of attackers. 4.5 Node seed vs. Delay, Packet Delivery Ratio and Throughut The node seed is varied from 0 to 50 m/s and the delay, acket delivery ratio and throughut metrics are calculated. With HADS scheme, the black hole attack is eliminated and the delay is thereby decreased, the throughut and acket delivery ratio are greater when comared to the absence of the HADS scheme. This is shown figs 4.1, 4.13 and The simulation results shows that delay decreases to 50%, acket delivery ratio increases to 0% and throughut increases to 10%. Though the node seed increases, the erformance does not get affected in HADS scheme. Fig.4.10Number of attacker s vs. throughut Fig 4.1 Node seed (m/s) vs. end to end delay Fig 4.11 Number of attackers vs. end to end delay (millisecond) Fig 4.13 Node seed(m/s) vs acket delivery ratio E-ISSN: Volume 13, 014
9 4.6. End to end delay The end to end delay of our roosed algorithm HADS shown in fig 4. is lesser comared with BHA attack and the NRMT algorithm shown in figure 4.16 below. This shows the better erformance of HADS algorithm NRMT Delay Vs Number of nodes 140 Fig 4.14 Node seed (m/s) vs. throughut (bits/sec) Delay(ms) Packet Delivery Ratio 4.6 Comarison of HADS algorithm with NRMT for 50 nodes with and without Black hole attack Packet Delivery Ratio The acket delivery ratio for HADS algorithm is better than NRMT and with BHA attack. This shows that HADS algorithm roduces better security than NRMT Packet Delivery Ratio Vs Number of nodes NRMT without BHA HADS with BHA Number of nodes Fig Number of nodes (50) vs. acket delivery ratio Number of nodes Fig Number of nodes (50) vs. end to end delay Routing Overhead The routing overhead of the roosed algorithm HADS is lesser comared to NRMT and with BHA attack. This is mainly due to the secret key generation using ECC in HADS scheme. routing overhead 7 x routing overhead Vs Number of nodes NRMT without BHA HADS with BHA Number of nodes Fig Number of nodes (50) vs. Routing Overhead E-ISSN: Volume 13, 014
10 5 Conclusion In this article the security is rovided by two schemes namely the ellitic curve crytograhy and the digital signature algorithm. Various oints are generated from the ellitic curve of rime field and a oint is chosen at random. When a set of nodes are ready to form a MANET, they authenticate and communicate with each other by using the rivate and ublic keys. The keys for the users are generated using the ellitic curve equation. Now the secret key to be shared is encryted using the RSA algorithm. The keys before sending and receiving must be signed at the sender and verified at the receiver. For authentication urose ellitic curve digital signature algorithm is adoted. So the concatenated and the encryted key along with the signature air key are sent through the channel. The receiver decryts and de-concatenates the secret key and does the verification rocess. Thus a new scheme, HADS comrises of hashing the keys and the imlementation of digital signature algorithm for verification and authentication. The security is thus enhanced at various levels which revent strong malicious attacks. In the existing method security is obtained by identity based scheme []. In this article instead of using identity based scheme, HADS scheme is imlemented. The erformances metrics such as acket delivery ratio, end to end delay, overhead and throughut are analysed with and without the resence of black hole attack in the AODV rotocol. The results are also comared with another secured HRMT algorithm [18]. The erformance metrics such as acket delivery ratio, end to end delay, overhead and throughut shows very good results when comared with HRMT algorithm. This roves that HADS scheme is highly secured. 6 Future Work In future a trust based scheme [17] can be used, in which the toology is simlified by allowing only the trusted nodes to articiate in the network which reduces the number of keys used and also the overhead. But such scheme is necessary for high security reasons in MANETs. Such security system is used in military and battle field. It is deloyed for both surveillance and combat oerations and has brought about the need for a large amount of data transfer between command centers and the edge of the tactical communication network. The technology at resent demands renewed attention owing to recent develoments in radio communications and advancements in wireless networking. References: [1] William Stallings, Crytograhy and network Security, 5 th edition, 01, [] Wan An Xiong, Yao Huan Gong, Secure and Highly Efficient Three Level Key Management Scheme for MANET, roceedings of WSEAS transactions on comuters, Volume 10, 011, [3] Maria Celestin Vigila S, Muneeswaran K, Imlementation of Text based Crytosystem using Ellitic Curve Crytograhy, IEEE, Volume 9, 009, [4] Durgesh Wadbude, Vineet Richariya, An Efficient Secure AODV Routing Protocol in MANET, International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 4, 01, [5] Prakash Kuuswamy, Peer Mohammad Aa, Dr. Saeed Q Y Al-Khalidi, A New Efficient Digital Signature Scheme Algorithm based on Block ciher, IOSR Journal of Comuter Engineering (IOSRJCE), Volume 7, Issue 1, 01, [6] Bin Sun and Bin Yu, The Three-Layered Grou Key Management Architecture for MANET, roceeding of 11th International Conference Volume 0, 009, [7] Fiat A and Shamir A, How to Prove Yourself: Practical Solutions to Identification and Signature Problems roceedings of the Sringer-Veriag, 1999, [8] Menezes A, Okamoto T and VanstoneL S, Reducing Ellitic Curve Logarithms to Logarithms in a Finite Field, journal of information theory, IEEE transaction, Volume 39, 1991, [9] Nishu Garg, Mahaatra R.P, MANET Security Issues, IJCSNS International Journal of Comuter Science and Network Security, Volume 9, 009, [10] Haiyun Luo, URSA Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, IEEE/ACM transactions on networking, Volume 1, No. 6, 004, [11] Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamaliour, Yoshiaki Nemoto, Detecting Black hole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic E-ISSN: Volume 13, 014
11 Learning Method, International Journal of Network Security, Volume 5, No.3, 007, [1] Jin-Hua Hong, Wei-Chung Wu, The Design of High Performance Ellitic Curve Crytograhic, IEEE, Volume 9, No.9, 009, [13] Gagandee, Aashima, Pawan Kumar, Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review, International Journal of Engineering and Advanced Technology (IJEAT), Volume 1, 01, [14] Himadri Nath Saha, Debika Bhattacharyya, Banerjee, A Distributed Administration Based Aroach for Detecting and Preventing Attacks on Mobile Ad Hoc Networks, International Journal of Scientific & Engineering Research, Volume, Issue 3, 011. [15] Mamatha G.S, Sharma S.C, A Highly Secured Aroach against Attacks in MANETS, International Journal of Comuter Theory and Engineering, Volume, 010, [16] Elizabeth. M. Royer, Chai-Keong Toh, A Review of Current Routing Protocols for Ad hoc Mobile Wireless Networks, IEEE Personal Communications, 009, [17] Edna Elizabeth, Radha. S, Priyadarshini. S, Jayasree. S, Naga Swathi. K, SRT-Secure Routing using Trust Levels in MANETs, Euroean Journal of Scientific Research, Vol.75 No.3, , 01. [18] Arunmozhi Annamalai, Venkataramani Yegnanarayanan, Secured System against DDos Attack in Mobile Adhoc Network, issue 9, volume 11, , 01 E-ISSN: Volume 13, 014
A Certification Authority for Elliptic Curve X.509v3 Certificates
A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks
Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de
Web Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 [email protected] Ugo Buy Comuter Science
A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
Local Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University [email protected] Rik Sarkar Comuter Science Freie Universität Berlin [email protected]
On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks
On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering
Storage Basics Architecting the Storage Supplemental Handout
Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it
A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
Red vs. Blue - Aneue of TCP congestion Control Model
In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 [email protected] [email protected] Nortel Networks TollBridge Technologies 6
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Secure synthesis and activation of protocol translation agents
Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
C-Bus Voltage Calculation
D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers
FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES
Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents
SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions
SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q TREVOR ARNOLD Abstract This aer demonstrates a few characteristics of finite extensions of small degree over the rational numbers Q It comrises attemts
ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE
AALYSIG THE OVERHEAD I MOBILE AD-HOC ETWORK WITH A HIERARCHICAL ROUTIG STRUCTURE Johann Lóez, José M. Barceló, Jorge García-Vidal Technical University of Catalonia (UPC), C/Jordi Girona 1-3, 08034 Barcelona,
Simulink Implementation of a CDMA Smart Antenna System
Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The
Buffer Capacity Allocation: A method to QoS support on MPLS networks**
Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean
Monitoring Frequency of Change By Li Qin
Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial
Traffic Analysis for Voice in Wireless IP Networks
Traffic Analysis for Voice in Wireless IP Networks TONI JANEVSKI BORIS SPASENOVSKI Deartment of Telecommunicatis, Faculty of Electrical Engineering University Sv. Kiril i Metodij Karos 2 bb, 1000 Skoje
The Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden [email protected] School of Technology and Society, Malmö University,
More Properties of Limits: Order of Operations
math 30 day 5: calculating its 6 More Proerties of Limits: Order of Oerations THEOREM 45 (Order of Oerations, Continued) Assume that!a f () L and that m and n are ositive integers Then 5 (Power)!a [ f
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
A Modified Measure of Covert Network Performance
A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy
Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks
Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,
6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks
6.042/8.062J Mathematics for Comuter Science December 2, 2006 Tom Leighton and Ronitt Rubinfeld Lecture Notes Random Walks Gambler s Ruin Today we re going to talk about one-dimensional random walks. In
Design of A Knowledge Based Trouble Call System with Colored Petri Net Models
2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung
Characterizing and Modeling Network Traffic Variability
Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,
An Associative Memory Readout in ESN for Neural Action Potential Detection
g An Associative Memory Readout in ESN for Neural Action Potential Detection Nicolas J. Dedual, Mustafa C. Ozturk, Justin C. Sanchez and José C. Princie Abstract This aer describes how Echo State Networks
Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems
Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction
Chapter 5 Simple Ad hoc Key Management 5.1 Introduction One of the most important consequences of the nature of the MANET networks is that one cannot assume that a node that is part of a network will be
EFS: Enhanced FACES Protocol for Secure Routing In MANET
EFS: Enhanced FACES Protocol for Secure Routing In MANET Geethu Bastian Department of Information Technology Rajagiri School of Engineering & Technology, Rajagiri Valley P O Kochi-39, India [email protected]
Load Balancing Mechanism in Agent-based Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042
Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2
Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2 1 Research Scholar, Department of Computer Science, Doaba Group of Colleges, Kharar, Punjab,
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)
Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND
STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK M.Yasodha 1, S.Umarani 2, D.Sharmila 3 1 PG Scholar, Maharaja Engineering College, Avinashi, India. 2 Assistant Professor,
Failure Behavior Analysis for Reliable Distributed Embedded Systems
Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of
COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS
OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Service Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
Title: Stochastic models of resource allocation for services
Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, [email protected] Phone : (54) 231-7688,
On Traffic Fairness in Data Center Fabrics
On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: [email protected]
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Evaluating a Web-Based Information System for Managing Master of Science Summer Projects
Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton [email protected] Andrew M. Gravell University of Southamton [email protected]
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
Automatic Search for Correlated Alarms
Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany
An important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National
SDN/OpenFlow. Outline. Performance U!, Winterschool, Zurich. www.openflow.org. SDN to OpenFlow. OpenFlow a valid technology!
SDN/OenFlow Performance U!, Winterschool, Zurich www.oenflow.org Kurt Baumann [email protected] Zurich, 08. March 2013 Outline SDN to OenFlow OenFlow a valid technology! Basic Concet How it works
Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti
Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti Project Introduction/Motivation With the emergence of the integrated circuits, the wireless
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
Comparing Dissimilarity Measures for Symbolic Data Analysis
Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,
The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)
Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
A Secure Intrusion Avoidance System Using Hybrid Cryptography
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
The risk of using the Q heterogeneity estimator for software engineering experiments
Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
An Approach to Optimizations Links Utilization in MPLS Networks
An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC.
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Conjunctive, Subset, and Range Queries on Encrypted Data
Conjunctive, Subset, and ange Queries on Encryted Data Dan Boneh [email protected] Brent Waters [email protected] Abstract We construct ublic-key systems that suort comarison queries (x a) on encryted
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations
A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;
Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting
Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network
Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France
From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling
From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France [email protected] Henri Casanova Det. of Information and Comuter Sciences University
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems
By Partha Chakroborty Brics "The roblem of designing a good or efficient route set (or route network) for a transit system is a difficult otimization roblem which does not lend itself readily to mathematical
Moving Objects Tracking in Video by Graph Cuts and Parameter Motion Model
International Journal of Comuter Alications (0975 8887) Moving Objects Tracking in Video by Grah Cuts and Parameter Motion Model Khalid Housni, Driss Mammass IRF SIC laboratory, Faculty of sciences Agadir
Receiver Buffer Requirement for Video Streaming over TCP
Receiver Buffer Requirement for Video Streaming over TCP Taehyun Kim a and Mostafa H. Ammar b a Wireless and Mobile Systems Grou, Freescale Semiconductor, Austin, TX 7735, USA E-mail: [email protected]
