Two Step Verification Using Hat (Hashing, Ant Colony, Tracking the IP) to Infer Identity of Polluters in MANET

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
Exploitation of rateless codes in MANET for dissemination of data chunks a node is determined. A node is created for coded block of payloads which gives solution to the problems of malicious node identification which implies pollution attack intentionally. Usually when vulnerable data packets intrude networks with malicious coded node which prohibits decoding of the message data appropriately in a network can be termed as pollution attacks. Normally a node creates check for decoding the chunk autonomously. As the pollution attack described in the existing system would not handle rateless codes which is not that much efficient to protect data while transmission.
Download Now

Find By Topic