2,307 research outputs found

    BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK

    Get PDF
    Ad-hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the reliable & secure communication paths in Mobile Adhoc Network, each node in the ad hoc network has to rely on each other in order to forward packets, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. In a mobile ad hoc network (MANET) where security is a crucial issue and they are forced to rely on the neighbor node, trust plays an important role that could improve the number of successful data transmission. Larger the number of trusted nodes, higher successful data communication process rates could be expected. In this paper, Black Hole attack is applied in the network, statistics are collected to design intrusion detection engine for MANET Intrusion Detection System (IDS). Feature extraction and rule inductions are applied to find out the accuracy of detection engine by using support vector machine. In this paper True Positive generated by the detection engine is very high and this is a novel approach in the area of Mobile Adhoc Intrusion detection system

    A New Digital Signature Scheme Using Tribonacci Matrices

    Get PDF
    Achieving security is the most important goal for any digital signature scheme. The security of RSA, the most widely used signature is based on the difficulty of factoring of large integers. The minimum key size required for RSA according to current technology is 1024 bits which can be increased with the advancement in technology. Representation of message in the form of matrix can reduce the key size and use of Tribonacci matrices can double the security of RSA. Recently M.Basu et.al introduced a new coding theorycalled Tribonacci coding theory based onTribonacci numbers, that are the generalization ofthe Fibonacci numbers. In this paper we present anew and efficient digital signature scheme usingTribonacci matrices and factoring

    System Design of Cold Weather Protective Clothing

    Get PDF
    System design of cold weather protective clothing is a critical process, as it involvesconsideration of the effects of a number of external and internal parameters like environmental factors and physical, physico-mechanical and psychological parameters. The bulk and weightof the textile materials used in protective clothing should be as low as possible, so thatclothing does not create physical stress and discomfort to the soldier and does not affecthis combat duties adversely. This paper discusses the essential factors involved in thedesigning of cold weather protective clothing and different insulating materials availablein the market for developing better protective clothing. Different stores'developed at theDefence Materials & Stores Research & Development Establishment, Kanpur, the order ofarrangement of various insulating materials in those stores and the protection level achievedare discussed
    • …
    corecore