• No results found

[PDF] Top 20 A Secure Approach with Physical Layer Encryption in MANET

Has 10000 "A Secure Approach with Physical Layer Encryption in MANET" found on our website. Below are the top 20 most common "A Secure Approach with Physical Layer Encryption in MANET".

A Secure Approach with Physical Layer Encryption in MANET

A Secure Approach with Physical Layer Encryption in MANET

... One approach to security issues focuses on the physical layer ...modern approach to physical-layer security [3]– [8] and later generalized by Csiz´ar and K¨orner ... See full document

5

An Encryption Algorithm for End to End Secure Data Transmission in MANET

An Encryption Algorithm for End to End Secure Data Transmission in MANET

... A Mobile Ad-Hoc Network (MANET) is a self-configuring infrastructure-less network of mobile devices connected wirelessly. Various devices are connected wirelessly on MANET and transmit data to one another. ... See full document

5

Novel Physical Layer Authentication Techniques for Secure Wireless Communications

Novel Physical Layer Authentication Techniques for Secure Wireless Communications

... enhanced physical layer authentication scheme was proposed by integrating the multipath delay characteristics into the channel-based authentication frame- ...this approach exploits the total di ff ... See full document

195

Route Discovery by Cross Layer Approach for MANET

Route Discovery by Cross Layer Approach for MANET

... network, physical layer, MAC layer and routing layer together contend for the network ...At physical layer transmission power and data rate is decided affects MAC and routing ... See full document

11

Mathematical Model and Framework of Physical Layer Encryption for Wireless Communications

Mathematical Model and Framework of Physical Layer Encryption for Wireless Communications

... Physical layer encryption (PLE) is another approach that is different from ...The encryption process itself does not rely on channel conditions and it can provide security protection ... See full document

8

Detecting and Preventing Attacks in MANET

Detecting and Preventing Attacks in MANET

... uses encryption, acknowledgement and principle of flow conversion approach for security against four attacks namely packet eavesdropping, message tampering, black hole attack and gray hole ...Based ... See full document

5

A Novel Approach to Secure Mysterious Location Based Routing For Manet

A Novel Approach to Secure Mysterious Location Based Routing For Manet

... Abid et al. [13] proposes a system which works on DHT- based routing. As per this routing nodes uses 3D structure to find relationship of node which again exploits 3D logical space by taking physical ... See full document

5

Cryptographic Primitives and Design Frameworks of Physical Layer Encryption for Wireless Communications

Cryptographic Primitives and Design Frameworks of Physical Layer Encryption for Wireless Communications

... out, including multi-antenna beamforming [3]–[5], artifi- cial noise techniques [6]–[9], and cooperative interference techniques [10], to name but a few. Over the last two decades, researchers have developed a ... See full document

14

Security and Privacy Challenges Using Multi Layer Encryption Approaches In Cloud Computing Environments

Security and Privacy Challenges Using Multi Layer Encryption Approaches In Cloud Computing Environments

... the approach of Multi-layer Encryption techniques in cloud computing thus enhancing the security parameters concerning sensitive data Thus with layer ways Encryption technique the data ... See full document

9

Cross Layer Interaction of PHY and a Cross Layer Design Approach for High Speed MANET

Cross Layer Interaction of PHY and a Cross Layer Design Approach for High Speed MANET

... cross layer design which combines adaptive modulation and coding at physical layer with truncated automatic repeat request at data link layer, in order to maximize performance in a fading ... See full document

5

Model Driven Platform for Service Security and Framework for Data Security and Privacy using Key Management in Cloud Computing

Model Driven Platform for Service Security and Framework for Data Security and Privacy using Key Management in Cloud Computing

... not secure because they are likely to have various attacks like Identity Access Management (IAM), hijacking an account or a service either by internal/external ...model-driven approach enables the definition ... See full document

7

Title: Cross Layer Design Approach for Future MANET Applications

Title: Cross Layer Design Approach for Future MANET Applications

... cross layer interaction based solutions: Functionally, the two neighboring layers namely physical and medium access are closely related due to which most of the protocols suggested for directionally enabled ... See full document

8

Honeypot-based Defense System Design
 

      N.Priya,   K.Naga Teja,   M.Anjay,  Abstract PDF  IJIRMET1602040028

Honeypot-based Defense System Design N.Priya, K.Naga Teja, M.Anjay, Abstract PDF IJIRMET1602040028

... A mobile ad hoc network (MANET) is a collection of wireless devices moving in seemingly random directions[1,2,3] and communicating with one another without the aid of an established infrastructure. Communicating ... See full document

7

A  Punctured  Programming  Approach  to  Adaptively  Secure   Functional  Encryption

A Punctured Programming Approach to Adaptively Secure Functional Encryption

... parameters. Encryption proceeds in two ...an encryption of the actual message m getting PDE ciphertext ...“core encryption” of the message and the tag t tells how one can derive the PDE key k (if one ... See full document

37

A Research Homomorphic Encryption Scheme to Secure Data Mining in Cloud Computing for Banking System Sneha Sakharkar *1 , Shubhangi Karnuke 1, Snehal Doifode1 , Vaishnavi Deshmukh 2

A Research Homomorphic Encryption Scheme to Secure Data Mining in Cloud Computing for Banking System Sneha Sakharkar *1 , Shubhangi Karnuke 1, Snehal Doifode1 , Vaishnavi Deshmukh 2

... Big data is difficult to handle, process and analyse using traditional approach. Using services, we can resolve problem like resource sharing, storage capacity and data transfer bottlenecks etc. But there is a ... See full document

5

A Secure Approach For e-Voting Using Encryption And Digital Signature

A Secure Approach For e-Voting Using Encryption And Digital Signature

... We conclude that this system provide security from all type of attacks, when vote is travelling from voting client to voting server from our experimentation. These attacks include security threats from passive as well as ... See full document

5

A Secure And Efficient Video Watermarking Approach Using DNA Encryption

A Secure And Efficient Video Watermarking Approach Using DNA Encryption

... Video watermarking is used to hide the secret data using a video frames to keep them secret from unauthorized access. There are several traditional techniques have been proposed by several researchers. However, these ... See full document

9

AES (Advanced Encryption Standard) Based Cryptography for Data Security in Cloud Environment

AES (Advanced Encryption Standard) Based Cryptography for Data Security in Cloud Environment

... Similarly, as with any remote stockpiling framework, there are main security properties that are very prescribed in distributed storage, specifically, classification, trustworthiness and freshness. These properties ... See full document

11

Trust based Cloud Brokerage Approach using Cryptographic and Weighed Technique

Trust based Cloud Brokerage Approach using Cryptographic and Weighed Technique

... The encryption time of the proposed Secure Cloud Bursting Approach for primary and secondary server is demonstrated using figure 4 and numeric data will arrange in table ...The encryption time ... See full document

5

A Stream Cipher Algorithm based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

A Stream Cipher Algorithm based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

... In the experiments, the original images and its corresponding encrypted images are shown in figure 3, and their histograms are shown in figure 5. It is clear that the histogram of the encrypted image is nearly uniformly ... See full document

7

Show all 10000 documents...