Avoiding Brute Force attack in MANET using Honey Encryption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 174 , Downloads: 150 | CTR: 86 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Avoiding Brute Force attack in MANET using Honey Encryption

Vinayak P P, Nahala M A

Mobile adhoc network includes wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure. This MANET is vulnerable to different types of attacks due to the certain features of network. Lot of attacks are there in MANET.Brute forcing is one of the attack that can create problem in communication in a MANET network. Mainly focusing on single hoc MANET Honey encryption can prevent such attacks during the normal encrypted data transmission. This is new type of encryption in which when an attacker tries to brute force by different keys different decrypted data will be got, thus the brute forcer will be confused totally about the actual content. A new type of randomized message encoding scheme called a distribution-transforming encoder (DTE).

Keywords: MANET, One-Time Pad, Honey Encryption, DTE, attack

Edition: Volume 4 Issue 3, March 2015

Pages: 83 - 85

Share this Article

How to Cite this Article?

Vinayak P P, Nahala M A, "Avoiding Brute Force attack in MANET using Honey Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151868, Volume 4 Issue 3, March 2015, 83 - 85

174 PDF Views | 150 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MANET'

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 143 , Downloads: 78 | CTR: 55 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Views: 147 , Downloads: 84 | CTR: 57 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'One-Time Pad'

Views: 131 , Downloads: 117 | CTR: 89 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1075 - 1078

DNA Based Cryptography

Durga Karapurkar, Veena Bhaskaran, Shreya Bale, Preeti Pednekar

Share this Article

Views: 174 , Downloads: 150 | CTR: 86 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 83 - 85

Avoiding Brute Force attack in MANET using Honey Encryption

Vinayak P P, Nahala M A

Share this Article

Views: 205 , Downloads: 170 | CTR: 83 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019

Pages: 402 - 405

Implementation of DES Algorithm in Python

Sakshi Agarwal, P K Bharti, Rajesh Kumar Pathak

Share this Article

Similar Articles with Keyword 'Honey Encryption'

Views: 134 , Downloads: 115 | CTR: 86 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1683 - 1686

Review on Honey Encryption Technique

Nahri Syeda Noorunnisa, Dr. Khan Rahat Afreen

Share this Article

Views: 174 , Downloads: 150 | CTR: 86 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 83 - 85

Avoiding Brute Force attack in MANET using Honey Encryption

Vinayak P P, Nahala M A

Share this Article

Similar Articles with Keyword 'attack'

Views: 37 , Downloads: 30 | CTR: 81 % | Weekly Popularity: ⮙16

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 47 , Downloads: 40 | CTR: 85 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 128 , Downloads: 89 | CTR: 70 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article
Top