MANET Communication in Embedded Devices through Adjoined Heterogeneous Protocols for Defence Application
Abstract
In this paper, we present a packet management technique for establishing communication by conjoining heterogeneous protocols in MANET that are implemented using Scilab tool in several embedded devices. The module presented here for packet management functions is NARVAL in Scilab. As any network has loads of packets, packet management techniques are necessary for handling the packets in the flow, at the source and also at the destination. The outcome of the study shows how one can establish an adaptive hub-spoke model of machine to machine communication network in ad hoc mobile communication system deploying on embedded devices being computationally inexpensive.
Keywords
Full Text:
PDFReferences
An NTT Communications. Successfully Combating DDoS Attacks. White Paper, Aug 2012.
Ankali Sanjay B, Ashoka DV. Detection Architecture of Application Layer DDoS Attack for Internet. Advanced Networking and Applications. 2011; 03(01): 984–990p.
Kulkarni AB, Bush SF, Evans SC. Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. GE Research & Development Center; Feb 2002.
Lau F, Rubin SH, Smith MH, et al. Distributed Denial of Service Attacks. [C] Proceedings of IEEE International Conference on Systems Cybernetics, New York: IEEE Press; 2000; 2275–2280p.
Abdelsayed S, Glimsholt D, Leckie C, et al. An Efficient Filter for Denial-of-Service Bandwidth Attacks. Proc. of the 46th IEEE
Global Telecommunications Conference (GLOBECOM03). 2003; 1353–1357p.
Criscuolo PJ. Distributed Denial of Service. Tribe Flood Network 2000, and Stacheldraht CIAC-2319, Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory. Feb 14, 2000.
Specht SM, Lee RB. Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures. In Proc. 17th International Conference on Parallel and Distributed Computing Systems. 2004; 543–550p.
Lonea AM, Daniel Elena Popescu, Huaglory Tianfield. Detecting DDoS Attacks in Cloud Computing Environment. International Journal of Computer Communication. Feb 2013; 8(1): 70–78p. ISSN 1841-9836.
Chen R, Park JM, Marchany R. TRACK: A Novel Approach for Defending against Distributed Denial-of-Service Attacks. Technical Report TR-ECE-06-02, Dept. of Electrical and Computer Engineering, Virginia Tech; Feb 2006.
Liu X, Li A, Yang X, et al. Passport: Secure and Adoptable Source Authentication. In Proc. 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI’08), San Francisco, CA, USA. 2008; 365–378p.
Ankush Rai. Automation in Computation. Journal of Advances in Shell Programming
Ankush Rai. Automation of Community from Cloud Computing. Journal of Advances in Shell Programming (JoASP). 2014; 1(2).
Ankush Rai. Shell Implementation of Neural Net Over the Unix Environment for File Management: A Step Towards Automated Operating System. Journal of Operating Systems. 2014; 1(2).
DOI: https://doi.org/10.37591/jomea.v4i2.5234
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Journal of Microcontroller Engineering and Applications