Downloads: 118 | Views: 128
Survey Paper | Computer Science & Engineering | Tanzania | Volume 3 Issue 10, October 2014
A Survey of Intrusion Detection on Spontaneous Wireless Adhoc Networks
Thangaraj E [3] | Arockia Jayadhas S
Abstract: This paper suggesting a sheltered protocol for spontaneous wireless ad hoc networks which uses public and private key that has trust in users in order to exchange the initial data and to exchange the data storage, manipulation, presentation, communication and other capabilities by encrypt such network services. While a sequence of operations that ensure protection of data used with a sheltered protocol, it provides secure delivery of message between network users and monitors the activities by using IDS. Most of the protocol takes network creation, management and protocol messages for building a network with spontaneous, so that it meets the requirement in a physical space in order to make use of services such as communication in group and security. The members who make up this community may vary at any specific time (users may join or leave at will), also offering self-configured sheltered protocol that is able to create the network and share networks secure services.
Keywords: DNS, IDC, IDS, NIDS
Edition: Volume 3 Issue 10, October 2014,
Pages: 747 - 751
Similar Articles with Keyword 'DNS'
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 132 - 137Deep Learning Model for Image Classification Using Convolutional Neural Network
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019
Pages: 1360 - 1363Enhanced Topology Discovery Protocol for SDN
Ajeesh S [5] | Betty Mary Jacob | Nisha Mohan P M