SIPTAN: Securing Inimitable and Plundering Track for Ad Hoc Network
Replay attack
Header
Dictionary attack
DOI:
10.1007/s11277-016-3187-y
Publication Date:
2016-01-30T15:51:40Z
AUTHORS (2)
ABSTRACT
An AdHoc network is a temporary network without any centralized agent or router, used for special purposes. A generalized group based approach delivers probabilities of existence of attackers. The overhead to identify each participant's authenticity and integrity at initial phase is out of consideration due to tedious effort. Flood attacks as well as chosen cipher text attacks are among the favorite attacks from such tuners. Session hijacking can also be taken into consideration in case of private data transfer among two ad hoc network nodes. Using a threshold based attack detection algorithm the flood attack can be denied with services. Chosen cipher text attack is evaded using randomized matrix arithmetic coding encryption scheme for arithmetic coding which delivers hard core decryption approach and provides a much easier way to match cipher with original pattern. Improvised datagram header information is made used to defend third party eavesdrop into a private session.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (19)
CITATIONS (8)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....