Título: AN EFFICIENT STRATEGY BASED DATA HIDING AGAINST JAMMING
Autores: Fathima, Mohammad Nafees; M.Tech Student, Dept of CSE, Nimra College of Engineering and Technology, Vijayawada, A.P
Minni, G.; Assistant Professor, Dept of CSE, Nimra College of Engineering and Technology, Vijayawada, A.P
Fecha: 2013-08-07
Publicador: International journal of computer and electronics research
Fuente:
Tipo: Peer-reviewed Article
Tema: Denial of Service; Wireless Communication; Packet Transfer;Communication Coverage; Classification of Packets;Jamming Selection; International Threat Respectively
Descripción: Here in the present aspect there is a major problem related to the attacks oriented strategy is a major concern oriented aspects respectively. With the advancement in the technology related aspect there is a major problem in the form of the threats which is of the international basis which is continuous affecting the system in a well effective manner. Here this type of the problems are more in this aspects related to the wireless based scenario where there is a less amount of the infrastructure followed by the effective transmission of the data in a well efficient manner respectively. Here many of the customers are getting attracted to this particular strategy where there is a reliable transmission of the data followed by the reduced cost oriented aspect based perspective respectively. Here everything is fine but there is a major problem related to this particular strategy is the attacks related to the jamming oriented phenomena in a well efficient manner respectively. This is one of the minute type of the technique which is continuously disturbing the system in a well effective manner respectively. Therefore many of the technique failed to overcome the problems related to this particular aspect in a well oriented fashion respectively. Here due to the jamming oriented criteria there is a compromising of the nodes takes place in the system where the nodes functionality gets handed over into the hands of the threat oriented malicious attack then the complete degradation of the performance takes place in the system in a well effective manner respectively. Here the problems related to the attacks based on the jamming oriented strategy is considered as the service oriented denial base aspect respectively. Here the new system is implemented in the consideration based aspect where there is a classification of the layer oriented physical strategy in a well effective manner against the attacks related to the selected jamming oriented criteria in a well respective fashion. Experiments are conducted on the present method and its evaluation of the performance based strategy is analyzed in a well respective fashion takes place.  
Idioma: Inglés

Artículos similares:

A hybrid k-Mean-GRASP for partition based Clustering of two-dimensional data space as an application of p-median problem por Nadella, Sunil; Associate Professor,P.G. Dept of Computer Science, Ideal College of Arts & Sciences, Kakinada,M V S V, Kiranmai; Lecturer ,Department of CSE,University College of Engineering,JNTU Kakinada,Gugulotu, Narasimha; Department of CSE JNTUH College of Engineering, Nachupally, Kondagattu,Karimnagar
Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment por Saini, Swarnpreet SIngh; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Bagga, Ritu; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Singh, Devinder; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Jangwal, Tarun; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar
A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography por R, Thamaraiselvan; Assistant Professor Dept. of Computer Applications M.G.R.College Dr. MGR Nagar Hosur - 635109 TN, India,Saradha, A.; Professor and Head, Department of Computer Science and Engineering, Institute of Road and Transport Technology, Erode, TN, India
RSA Algorithm Implementation for Ciphering Medical Imaging por Ali, Samoud; Signal processing Laboratory - Science Faculty of Tunis , 1060 Tunis.,Adnen, Cherif; Signal processing Laboratory - Science Faculty of Tunis , 1060 Tunis.
A STUDY ON KNOWLEDGE ACQUISITION APPROACH FOR COMPOSITE AEROSPACE COMPONENT DESIGN por Sivaraman, G; Assistant Professor & HeadDept. of Computer ApplicationsM.G.R.CollegeDr. MGR NagarHosur - 635109TN
Corpus based Emotion Extraction to implement prosody feature in Speech Synthesis Systems por Chandak, Manoj B; DEPTT. OF COMPUTER SCIENCE AND ENGG S.R.K.N.E.C NAGPUR UNIVERSITY,Bhutekar, Swati
A NEW DATA HIDING METHOD USING PIXEL POSITION AND LOGICAL AND OPERATION por Saini, Ravi; C.M.R.A., GP Sanghi,Rohtak, Haryana,Yadav, Rajkumar; U.I.E.T, Maharshi Dayanand University, Rohtak
A New Focus on Distance Learning for Physically Impaired Students: A Multi-agent Oriented Approach por Pujari, Shiladitya; University Institute of Technology, Burdwan University,Mondal, Subrata
Productivity Inference with Dynamic Bayesian Models in Software Development Projects por Naman, Abou Bakar; Department of Comptuer Science & Information Technology Sarhad University,Lali, M.Ikram.; University of education Lahore, Attock campus
10