RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Improved Trust Based Routing Mechanism in DSR Routing Protocol in MANETs

        Ankita Sahu,Vikas Sejwar 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.1

        Mobile Ad hoc Network (MANET) is a self organizing wireless network for mobile devices. They do not need any fixed infrastructure to be configured which makes it more suitable to be used in environments that require on-the-fly setup. The present work discusses the challenging issues in MANET routing security. It presents improved DSR, a trust-based scheme for securing DSR routing protocol in MANET using the friendship mechanism and gateway. The path which is most optimum is chosen as the final route from source to destination. The gateway nodes should not be malicious .The nodes can evaluate the routing paths according to some selected features (such as node reputation and identity information) before forwarding the data through these routes. It is implemented in our scheme, simulation (using NS2). This scheme provides a robust environment where MANET nodes can trust each other in a secure community. Experimental results show that our gateway based DSR improves network performance to much extent.

      • Sybil Attack Detection and Analysis of Energy Consumption in Cluster Based Sensor Networks

        Sweety Saxena,Prof. Vikas Sejwar 보안공학연구지원센터 2014 International Journal of Grid and Distributed Comp Vol.7 No.5

        Wireless Sensor Network is an emerging new technology extensively used for large-scale real-time data processing due to its characteristics and is used in application areas such as in civilian and military domains. These networks are vulnerable to several security attacks. In this paper, we emphasize on Sybil attack, which is a harmful threat to sensor networks and proposed an algorithm for Sybil attack detection based on Time difference of Arrival (TDOA) localization method, which detects the malicious behavior of the head node and member nodes in a cluster based network.

      • Avoidance of Hidden Terminal & Exposed terminal problem Using Directional MAC Protocol

        Khushboo Agarwal,Vikas Sejwar 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.4

        The mobile Adhoc network is deployed in the environment where traditional wired network cannot be established due to its required features and their limitation. Use of directional antenna is one of the most promising technique for the high speed wireless network such as IEEE 802.11.Proposed a new directional MAC protocol to address the Directional Hidden terminal problem and Directional Exposed Terminal Problem.

      • QR Code Steganography for Multiple Image and Text Hiding using Improved RSA-3DWT Algorithm

        Shweta Sharma,Prof. Vikas Sejwar 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.7

        In this research, we presented another implanting calculation for QR Code Image Steganography and Text Hiding, which is based on 3-discrete wavelet transform (DWT) and improved RSA algorithm. Firstly, enter the text message and choose four random numbers for RSA encryption. After that, take four pictures: one is cover image and another is secret image. In the process of embedding, we divide RGB image into three planes: Red, Green and Blue. In this work, embed multiple color secret images into a single cover image for providing security. At last, encrypted text message is concealed into an embedded picture using Least significant bit (LSB). We evaluate performance on the basis of the peak signal noise ratio (PSNR) and structural similarity matrix (SSIM) with different varying weights. In this proposed, compared this algorithm to 1-DWT. In the extraction process, recover three secret image from stego image and decrypt text message.In this experiment, improved PSNR value as compared to previous paper. The experimental outcomes will be reached upto 84%. In our method, DWT is applied to decompose the cover image and produce the low and high frequency coefficients to take benefits of robustness and security goods.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼