Survival of an Intrusion Tolerance Database System ijtsrd
While traditional secure database systems rely on prevention control and are very limited in surviving malicious attack, an intrusion tolerant database system can operate through attacks in such a way that the system can continue delivering essential services in the face of attacks. The emphasis of survivability is on continuity of operations, with the understanding […]
A Secure Multi Agent VANET Model to Improve Communication Services in VANET IJTSRD
In the recent decade the VANET has been emerged as a prominent field for research and it receives considerable attention. VANET uses different specifications of the WLAN 802.11 family. It takes the basics of ad hoc network and the VANET creates a network with a collection of independent entities with the ability to communicate among […]
A Study on Ad hoc on-Demand Distance Vector(AODV) Protocol IJTSRD
AODV is a very simple, efficient, and effective routing protocol for Mobile Ad hoc Net works which do not have fixed topology. This algorithm was motivated by the limited bandwidth that is available in the media that are used for wireless communications. It borrows most of the advantageous concepts from DSR and DSDV algorithms. The […]
An Effective Routing Algorithm to Enhance Efficiency with WSN IJTSRD
Moving network is the most valuable network of today environment since it does multiple and multilevel communication services during move , it also incorporate many digital techniques to performance real time confidential and security awareness task for the purpose of user facility and services in the similar way it generate various challenges for its designer […]
A Review Study on Preventing and Detecting Technique of Black Hole Attack in MANET IJTSRD
There are basically two types of black hole attack i.e. internal black hole and External black hole attack. Black hole is a malicious node that wrongly replies for some route requests without having active route to particular destination and drop all the getting packets. If these malicious nodes work jointly as a collection then the […]