This paper is published in Volume 3, Issue 3, 2018
Area
Networking
Author
Ramya. P
Co-authors
Vijayakumari. V, Vijayanand. S, Anitha. S, Nathiya. G, Ponmozhi. C
Org/Univ
The Kavery Engineering College, M. Kalipatti, Tamil Nadu, India
Pub. Date
20 March, 2018
Paper ID
V3I3-1188
Publisher
Keywords
Secure, Avoid, Medium Access Control.

Citationsacebook

IEEE
Ramya. P, Vijayakumari. V, Vijayanand. S, Anitha. S, Nathiya. G, Ponmozhi. C. Secure and Avoid Inter-User Collision for Medium Access Control, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.

APA
Ramya. P, Vijayakumari. V, Vijayanand. S, Anitha. S, Nathiya. G, Ponmozhi. C (2018). Secure and Avoid Inter-User Collision for Medium Access Control. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARnD.com.

MLA
Ramya. P, Vijayakumari. V, Vijayanand. S, Anitha. S, Nathiya. G, Ponmozhi. C. "Secure and Avoid Inter-User Collision for Medium Access Control." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2018). www.IJARnD.com.

Abstract

Remote system powerfully designates channel assets to enhance otherworldly effectiveness and, to keep away from impacts, has its clients coordinate with each other utilizing a medium access control (MAC)convention. Nonetheless, MAC accepts client consistence furthermore, can be inconvenient when a client gets out of hand. An assailant who traded off the system can dispatch additionally destroying black hole attack(BHA) assaults than a system untouchable by sending unreasonable reservation solicitations to squander data transfer capacity, by tuning in to the control messages and leading force effective sticking, by distorting data to control the system control, etc. We construct SecureMAC to guard against such insider dangers while holding the advantages of coordination between the helpful clients. Secure MAC is contained four parts: channelization to anticipate inordinate reservations, randomization to upset receptive focused on sticking, coordination to counter control-message mindful sticking and resolve over reserved also, under-held range, and power attribution to decide every hub's commitment to the got control. Our hypothetical examinations and execution assessments illustrate better execution over past methodologies, which either disregard security issues or surrender the advantage of participation when under assault by handicapping client coordination, (for example, the Nash balance of nonstop wideband transmission).
Paper PDF