ENHANCED SECURITY IN ADHOC NETWORK USING TCP/IP BASED TECHNOLOGY
Keywords:
Hacker, SOCKET, CRYPTOGRAPHYAbstract
The rapid growth of Internet has made communication an integrated and highly important factor of computing. In today’s society with the development of mobile devices it has become important to stay online all the time. After the ad hoc network has been established the nodes that connect the network might move, say for example that one military squad is under heavy attack and has to escape. In ad hoc networks nodes should be able to move freely and the information should be routed through new paths after old ones have been broken, the network should also be able to handled clustering. The advent of ad hoc network has given birth to new kinds of routing algorithms and new security threats.
References
C.Siva Ram Murthy and B.Smanoj, “ Ad Hoc Wireless Networks – Architectures and Protocols”, Pearson Education, 2004.
Feng Zhao and Leonidas Guibas, “Wireless Sensor Networks”, Morgan Kaufman Publishers, 2004.
C.K.Toh, “Ad Hoc Mobile Wireless Networks”, Pearson Education, 2002.
Thomas Krag and Sebastin Buettrich, “Wireless Mesh Networking”, O’Reilly Publishers, 2007.
Agi, I., Gong, L.: An empirical study of secure mpeg video transmissions. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144. IEEE Press, New York (1996)
Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time trans-port protocol (SRTP) (2004)
Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi: 10.1109/ MMSP.2005.248641
Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000). doi: 10.1109/78.852023
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.