IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 10    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 10,October 2012
Secure Wireless Network System against Malicious Rogue Threats (System Attacks) within cooperative distributed network and wireless network
Full Text(PDF, )  PP.386-389  
Latesh Kumar K.J, Dr.Lawrance R
— Wireless Network, Intrusion Detection, Local Round-Trip Time (LRTT)
With the expanse of the Internet and the increased reliance on computer networking technology for everyday business, the need to protect electronic data and communication from malicious attack has become increasingly critical. This paper addresses the rog
[1] S. Bose and A.Kannan , “Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks”, IEEE 2008

[2] Matthew Smith, Michael Engel, Thoms Fries, Bernd Frielsen, “Security Issues in On-Demand Grid and Cluster Computing”, IEEE2006

[3] Xuhua Wang, Shuhong Wang, Baihua Zheng, “Secure Real-time User Preference Collection for Broadcast Scheduling”, IEEE2006

[4] Fei Wang, Yijun Mo, Student Member IEEE and Benxiond Huang, “Defending Reputation System against False Recommendation in Moible Ad Hoc Network”. IEEE2008

[5] Darcy Hagedorn, Bruce Honda, Dick Peterson, “PROCESS CONTROL SECURITY JOURNEY”, IEEE2007.

[6] Bharath Madhusudhan, John Lockwood, “Design of System for Real-Time Worm Detection”,IEEE2004.

[7] Atual Adya, Paramvir Bahl, Ranveer Chandru and Lili Qiu, Architecture and techniques for diagnosing faults in IEEE802.11 infrastructure networks. IN Proceedings of ACM MobiCom, pages 30-44 septem 2004.

[8] IEEE Std 802.11: IEEE Standard for Wirelness LAN Medium Acess Control (MAC) and Physical Layer (PHY) Specification, June 1997.

[9] Broadcom radically simplies the wi-fi setup experience. Press Releasem Broadcom Corporation, May 2004.

[10] Giuseppe Ateniese, Michael Steiner, and Gene Tsudik, New multipart authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications, 18(4):628-639:2000.

[11] Steven M.Bellovin. Spamming, Phishing, Authentication, and Privacy communications of the ACM, 47(12):144, 2004.

Untitled Page