HIDING PACKET SEND THROUGH MULTIPLE TRANSMISSION LINE BY VIRTUALLY IN AD HOC
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 1)Publication Date: 2014-01-30
Authors : N. MOHAMED BAYAS S.Rajesh;
Page : 101-108
Keywords : ;
Abstract
The nature of the Ad hoc Network leaves it vulnerable to intentional attacks. This intentional interference with wired transmission can be used for mounting denial of service attacks on Ad hoc Network. The protocol specification and network secrets can low effect attacks that are difficult to detect. In this work a problem of selective attacks is actively for a short period of time, selectively targeting messages of high importance. A selective attack on TCP can be launched performing real time packet classification at physical layer. Every hiding of the packet to be sent through many transmission lines but the transmission line will be selected based on virtually to setting a path by randomly. The random of selecting the transmission lines for the packet that will be protected from the unauthorized users. The transmission line can be changed from time to time based on the current traffic and the topology. The sending of every packet from source to destination via the various intermediate nodes can be changed dynamically. We analyze and evaluate have been conducted to verify the effectiveness and efficiency of using the transmission line.
Other Latest Articles
- The Role of Software Engineering Ontology Model & Design for Multi-Site Software Development
- Bit Error Rate Performance in Coherent Optical Systems
- PROXY RE-ENCRYPTION USING HYBRID ENCRYPTION SCHEME SECURE AGAINST CHOSEN CIPHERTEXT ATTACK
- Review Literature for Mosfet Devices Using High-K
- Securing Sensitive Information in Social Network Data Anonymization
Last modified: 2014-01-25 22:36:42