Vulnerability Evaluation of Network Traffic Using Set Theoretic Analysis for Joint Security and Rout
2014-04-05
0 0 0
no vote
Other
Earn points
Abstract - wireless routing protocol network reveals the fact that security and routing cannot be set up together. Investigate the network traffic that affects the confidentiality and integrity of node capture attacks. I developed a method called gnave (greedy node method capture exploit vulnerability approximation evaluation), which maximizes the vulnerability generated from the information needed for capture used on each individual node to form the node (route vulnerability Metric) that previously captured together to provide secure use of RVM Methods, quantitative, effective and safe traffic crossing for a given node, and theoretical analysis of optimized routing using set. The vulnerability is to measure the use of routing and encryption protocols to analyze and provide secure network communication for vulnerabilities in each node. Cost minimization capture attack time at each computing node. Using known parameters, such as bandwidth, channel capacity and flow speed, the adverse effects can be analyzed. The key management facility is embedded as part of the project. A key management scheme is designed to meet the security requirements through selective distribution without overhead computing node tips or bandwidth usage.
java
Related Source Codes
Android AOA Android Open Accessory Development Usi
0
0
no vote
VPN source code accelerator
0
0
no vote
VPN source code
0
0
no vote
Springboot Campus Recruitment System
0
0
no vote
Java intelligent QR code access control management
0
0
no vote
No comment