Sprinkling Data Prevents From Intruders

Abstract

The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mobile nodes communicating through wireless channels lacking of any existing network infrastructure or centralized authority.Some of the most challenging issues in this scenario misbehaviours and burglar detection. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malicious, especially when dealing with many networks or obfuscated malware. In this paper we propose trustable naive Bayesian (TNB)model. It is profitably function for wired networks but not applied for ad-hoc networks. In this paper we address major problem of Manetsmalicious nodes are produce fake estimations. We identify two exclusive challenges on Manets these are phony estimation of trustable node and un-estimated of spam node detection. Furthermore, we dogmatic filtering, and adaptive routing communication in Manets.

Authors and Affiliations

D. V. S Sujitha, S Babu

Keywords

Related Articles

Dynamic Authentication over Graphical Passwords using Visual Cryptography

CAPTCHA is a test build by computer programs which human can pass but computer programs cannot pass CAPTCHA as graphical passwords (CaRP) are a graphical password scheme used for a user access authentication. It is m...

Extraction of Frequent Subgraph from Graph Database

Graphs are promising abstraction of complex structured and semi-structured data. Graph mining techniques extract, analyze and summarize significant and useful information from the graph databases. Finding frequent su...

On Veracious Search In Unsystematic Networks

The Unstructure peer-to-peer (P2P) filesharing networks are popular in the mass markets. As the peers participating in unstructure networks interconnect randomly they rely on flooding query messages to discover object...

A Game Theory To Load Balancing Strategy To Improve The Efficiency In Public Cloud Environment

Good load balancing makes cloud computing more proficient and increases user satisfaction. At present cloud computing is one of the utmost platforms which deliver storage of data in very lowers cost and accessible fo...

Power Analysis of Concurrent Error Detection in Orthogonal Latin Squares Codec

One of the major drawbacks of the data transmission is existence of errors. These errors exist in the circuits for transmission, reception and data storage. Error correction codes (ECCs) are commonly used toprotect me...

Download PDF file
  • EP ID EP28155
  • DOI -
  • Views 252
  • Downloads 1

How To Cite

D. V. S Sujitha, S Babu (2015). Sprinkling Data Prevents From Intruders. International Journal of Research in Computer and Communication Technology, 4(3), -. https://europub.co.uk./articles/-A-28155