International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 153

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015


Avoiding Brute Force attack in MANET using Honey Encryption

Vinayak P P [2] | Nahala M A [2]


Abstract: Mobile adhoc network includes wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure. This MANET is vulnerable to different types of attacks due to the certain features of network. Lot of attacks are there in MANET. Brute forcing is one of the attack that can create problem in communication in a MANET network. Mainly focusing on single hoc MANET Honey encryption can prevent such attacks during the normal encrypted data transmission. This is new type of encryption in which when an attacker tries to brute force by different keys different decrypted data will be got, thus the brute forcer will be confused totally about the actual content. A new type of randomized message encoding scheme called a distribution-transforming encoder (DTE).


Keywords: MANET, One-Time Pad, Honey Encryption, DTE, attack


Edition: Volume 4 Issue 3, March 2015,


Pages: 83 - 85


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Vinayak P P, Nahala M A, "Avoiding Brute Force attack in MANET using Honey Encryption", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 83-85, https://www.ijsr.net/get_abstract.php?paper_id=SUB151868

Similar Articles with Keyword 'MANET'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [28]

Share this Article
Top