Updating search results...

Search Resources

2 Results

View
Selected filters:
  • basic-protocols
Cryptography and Cryptanalysis
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Micali, Silvio
Date Added:
02/01/2005
E-APSAR:Enhanced Anonymous Position Based Security Aware Routing Protocol For Manets
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

In the past few years, we have seen a rapid expansion in the field of mobile computing due to the pro- liferation of inexpensive, widely available wireless devices or networks.However, all these networks are conventional wireless networks as they require a fixed network infrastructure with cen- tralised administration for their operation, potentially consuming a lot of time and money for set-up and maintenance.Drawbacks of conventional wireless networks are driving a new alternative way for mobile communication, in which mobile devices form a selfcreating, self-organising and self-administering wireless network, called a mobile ad hoc network.In mobile ad-hoc networking (MANETs), nodes communicate to each other based on public identities. In this paper,for a position based routing[22] an innovative packet forwarding mechanism is proposed in which source node generates route request packet and broadcast packet to other neighbor nodes to locate destination by implementing black hole attack[8]. Proposed E-APSAR (Enhanced Anonymous Position Based security aware routing protocol) is implemented on NS-2 and results shown significant improvement over original DSR in terms of various performance metrics. It has been found that on dense network certain numbers of malicious nodes are supportive to reducing communication overhead and because of density negative effect of malicious attacks which is proposed E-APSAR that is able to reduce. Hence result shows proposed E-APSAR will be helpful to decrease communication overhead.

Subject:
Engineering
Material Type:
Module
Author:
Sweta Parkhedkar
priyanka malgi
Date Added:
10/22/2017