Acknowledgement based Intrusion-Detection System for MANETS
Abstract
Keywords
References
A.Shamir, “How to share a secret,†Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
G. R. Blakley, “Safeguarding cryptographic keys,†in Proc. National Computer Conf., 1979, vol. 48, pp. 313–317.
M.Naor and A. Shamir, “Visual cryptography,†in Proc. EUROCRYPT’ 94, Berlin, Germany, 1995, vol. 950, pp. 1–12, Springer-Verlag, LNCS.
M. Naor and B. Pinkas, “Visual authentication and identification,†in Proc. CRYPTO’97, 1997, vol. 1294, pp. 322–336, Springer-Verlag LNCS.
T. H. Chen and D. S. Tsai, “Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol,†Pattern Recognit., vol. 39, pp. 1530–1541, 2006.
P. Tuyls, T. Kevenaar, G. J. Schrijen, T. Staring, and M. Van Dijk, “Security displays enabling secure communications,†in Proc. First Int. Conf. Pervasive Computing, Boppard Germany, Springer-Verlag Berlin LNCS, 2004, vol. 2802, pp. 271–284.
C. Blundo, A. De Bonis, and A. De Santis, “Improved schemes for visual cryptography,†Designs, Codes and Cryptography, vol. 24, pp. 255–278, 2001.
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, “Visual cryptography for general access structures,†Inf. Computat., vol. 129, pp. 86–106, 1996.
N. K. Prakash and S. Govindaraju, “Visual secret sharing schemes for color images using halftoning,†in Proc. Int. Conf. Computational Intelligence and Multimedia Applications (ICCIMA 2007), 2007, vol. 3, pp. 174–178.
H. Luo, F.X.Yu, J. S. Pan, and Z. M. Lu, “Robust and progressive color image visual secret sharing cooperated with data hiding,†in Proc. 2008 Eighth Int. Conf. Intelligent Systems Design and Applications, 2008, vol. 3, pp. 431–436.
} J. Broch, D. A. Maltz, D. B. Johnson, Y. Hu, J. Jetcheva, A Performance Comparison of Multi-Hop Wireless Ad Hoc network Routing Protocols, Proc. Of MobiCom’98, Oct. 1998
] E. R. Royer, C.-K. Toh, A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks, , IEEE Personal Communications, Apr. 1999
V. D. Park and M. S. Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, , IEEE INFOCOM’97, 1997
Prof. Ravindra Rathod, Prof M. D. Ingle , Prof. Bharat S Kankate , Prof R. M. Kawale
Dr.J.Subash Chandra Bose , U.Akila Devi 2, M.Prasanalaxmi 3 , K.Malathi 4 , K.P.Vinodhini 5 , S.Saranya 6 Professor and Head, Department of Computer Science Engineering, Professional Group of Institutions, Palladam,
K. Fall, S. Floyd, “Simulation-based comparisons of Tahoe,Reno, and SACK TCPâ€, CM Computer Communication Review, 26(3), 6/96, pp. 5-2
K. Fall, S. Floyd, “Simulati on-based comparisons of Tahoe, Reno, and SACK TCPâ€, ACM Computer Communication Review, 26(3), 6/96, pp. 5-2
K.Liu,J.Deng,P.K.Varshney, And K.Balakrishnan -“An acknowledgement-based approach for the detection of routing misbehavior in MANETsâ€.[May-2007]
S . Marti , T . J. Giuli , K . Lai ,and M . Baker, -“Mitigating routing misbehavior in mobile ad hoc networksâ€.[Mar-2000]
T . Sheltami , A . Al-Roubaiey , E . Shakshuki ,and A . Mahmoud,- “Video transmission
enhancement in presence of misbehaving nodes in MANETsâ€.[Oct-2009]
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â