Open Access Open Access  Restricted Access Subscription or Fee Access

MANET Communication in Embedded Devices through Adjoined Heterogeneous Protocols for Defence Application

Ankush Rai

Abstract


In this paper, we present a packet management technique for establishing communication by conjoining heterogeneous protocols in MANET that are implemented using Scilab tool in several embedded devices. The module presented here for packet management functions is NARVAL in Scilab. As any network has loads of packets, packet management techniques are necessary for handling the packets in the flow, at the source and also at the destination. The outcome of the study shows how one can establish an adaptive hub-spoke model of machine to machine communication network in ad hoc mobile communication system deploying on embedded devices being computationally inexpensive.


Keywords


routing protocols, packet management

Full Text:

PDF

References


An NTT Communications. Successfully Combating DDoS Attacks. White Paper, Aug 2012.

Ankali Sanjay B, Ashoka DV. Detection Architecture of Application Layer DDoS Attack for Internet. Advanced Networking and Applications. 2011; 03(01): 984–990p.

Kulkarni AB, Bush SF, Evans SC. Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. GE Research & Development Center; Feb 2002.

Lau F, Rubin SH, Smith MH, et al. Distributed Denial of Service Attacks. [C] Proceedings of IEEE International Conference on Systems Cybernetics, New York: IEEE Press; 2000; 2275–2280p.

Abdelsayed S, Glimsholt D, Leckie C, et al. An Efficient Filter for Denial-of-Service Bandwidth Attacks. Proc. of the 46th IEEE

Global Telecommunications Conference (GLOBECOM03). 2003; 1353–1357p.

Criscuolo PJ. Distributed Denial of Service. Tribe Flood Network 2000, and Stacheldraht CIAC-2319, Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory. Feb 14, 2000.

Specht SM, Lee RB. Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures. In Proc. 17th International Conference on Parallel and Distributed Computing Systems. 2004; 543–550p.

Lonea AM, Daniel Elena Popescu, Huaglory Tianfield. Detecting DDoS Attacks in Cloud Computing Environment. International Journal of Computer Communication. Feb 2013; 8(1): 70–78p. ISSN 1841-9836.

Chen R, Park JM, Marchany R. TRACK: A Novel Approach for Defending against Distributed Denial-of-Service Attacks. Technical Report TR-ECE-06-02, Dept. of Electrical and Computer Engineering, Virginia Tech; Feb 2006.

Liu X, Li A, Yang X, et al. Passport: Secure and Adoptable Source Authentication. In Proc. 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI’08), San Francisco, CA, USA. 2008; 365–378p.

Ankush Rai. Automation in Computation. Journal of Advances in Shell Programming

Ankush Rai. Automation of Community from Cloud Computing. Journal of Advances in Shell Programming (JoASP). 2014; 1(2).

Ankush Rai. Shell Implementation of Neural Net Over the Unix Environment for File Management: A Step Towards Automated Operating System. Journal of Operating Systems. 2014; 1(2).




DOI: https://doi.org/10.37591/jomea.v4i2.5234

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Journal of Microcontroller Engineering and Applications