Inicio > > Redes y comunicaciones informáticas > Security in MANET’S by using Symmetric Key Cryptography
Security in MANET’S by using Symmetric Key Cryptography

Security in MANET’S by using Symmetric Key Cryptography

Ch Anusha / G Rajendra Kumar / Y Srilatha

54,06 €
IVA incluido
Disponible
Editorial:
KS OmniScriptum Publishing
Año de edición:
2021
Materia
Redes y comunicaciones informáticas
ISBN:
9786203307672
54,06 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

The current textbook is about the security in mobile ad-hoc networks by using cryptographic secrete key. Now-a-days security is a major challenging problem in mobile ad-hoc networks because the nodes in mobile ad-hoc networks are moving from one place to another due to this the structure of the network changes frequently. The topology changes may cause 'routing modification attack' problem that can easily be exploited against the MANETs. The main goal of routing attacks is to disrupt normal functioning of network by advertising false routing updates. On the other hand data communication attacks include modification or dropping of data packet that does not disrupt routing protocol. In this work, this could be achieved by adding some extensions for secure routing. These extensions include integrity which means the message modification is not allowed and authentication which means the node validation (identification) is done. This protection is provided by a hashed message authentication code function that provides fast message verification and information about sender as well as intermediate node authentication.

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
  • Data Warehouses and OLAP
    ...
  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...