Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 7, July 2016

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Wireless network are used very rapidly. Mobile ad hoc network (MANET) is one of the most important applications of wireless networks in which nodes present in the system work individually. In this paper, we have proposed a system, which can provide high security when data is send from source to destination. The system is called as Hybrid Cryptography. Hybrid Cryptography gives a better security than any other traditional approaches. In existing system less security provider is used. In this paper, to reduce network traffic, packet delivery ratio caused by existing system, we are using digital signature based RSA and DES algorithm. Compared to present approaches, Hybrid Cryptography demonstrates higher malicious behavior detection rates in certain states while does not greatly affected the network performances

Keywords: Enhanced Adaptive Acknowledgement EAACK, Mobile Ad-hoc Network MANET, Packet Delivery Ratio PDR, Received Signal Strength RSS

Edition: Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Share this Article

How to Cite this Article?

Pranita Prakash Kulkarni, "Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164841, Volume 5 Issue 7, July 2016, 1057 - 1058

79 PDF Views | 43 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Enhanced Adaptive Acknowledgement EAACK'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

Similar Articles with Keyword 'Mobile Ad-hoc Network MANET'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 881 - 885

A Review - Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs

Hansraj Bhakte, Rahul Kulkarni

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 146 - 148

A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network

Deepti Ranaut, Madal Lal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 177 - 183

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 273 - 276

Performance Evaluation of Secured Reactive Routing Protocols in MANETs

Shwetha T R, Dr Arun Biradar

Share this Article

Similar Articles with Keyword 'Packet Delivery Ratio PDR'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article
Top