Handbook of image processing operators
Handbook of image processing operators
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
On the accuracy of MANET simulators
Proceedings of the second ACM international workshop on Principles of mobile computing
Fast Content-Based Packet Handling for Intrusion Detection
Fast Content-Based Packet Handling for Intrusion Detection
Speeding-up normalized neural networks for face/object detection
Machine Graphics & Vision International Journal
OPHMR: An Optimized Polymorphic Hybrid Multicast Routing Protocol for MANET
IEEE Transactions on Mobile Computing
Fast Code Detection Using High Speed Time Delay Neural Networks
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III
Fast packet classification for Snort by native compilation of rules
LISA'08 Proceedings of the 22nd conference on Large installation system administration conference
Challenges in mobile ad hoc networking
IEEE Communications Magazine
A simulation study of table-driven and on-demand routing protocols for mobile ad hoc networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper, an efficient fast secure routing protocol for MANET is presented. Fast packet detection is a critical issue to overcome intrusion attack. Here, a new approach for fast packet detection during data transmission is presented. Such algorithm uses fast time delay neural networks (FTDNNs). The operation of these networks relies on performing cross correlation in the frequency domain between the input data and the input weights of neural networks. It is proved mathematically and practically that the number of computation steps required for the presented FTDNNs is less than that needed by conventional time delay neural networks (CTDNNs). Simulation results using MATLAB confirm the theoretical computations. This security algorithm is involved with Ad hoc Dynamic Source Routing (DSR) protocol based on mobility prediction, named as MDSR. Such protocol controls route discovery, route keeping and route switching according to the distance and mobility estimation of the neighbor nodes. The proposed protocol is implemented by using a modified NS2. The performance of the proposed protocol is described. Simulation results are given.