International Journal of Advanced Information and Communication Technology


Real-Time Unauthorized Access Detection in Wired or Wireless Networks: using Domino Concept

S. SheikAbdulla, N. ArunKumar, B. lokeshAravind, S. Thivaharan, Kalaignar Karunanidhi Institute of Technology, Coimbatore, Tamilnadu, India.

DOI : 01.0401/ijaict.2015.11.17

International Journal of Advanced Information and Communication Technology

Received On : April 10, 2018

Revised On : May 15, 2018

Accepted On : June 12, 2018

Published On : July 05, 2018

Volume 05, Issue 07

Pages : 888-890

Abstract


We find interprets with the security and the misbehavior threat within the 802.11 connections. Whereas the connection are used worldwide with the level of integration of the devices, within some of its relational devices which provide connections .The misbehavior achieved with their connections are the real time misbehavior,back-off misbehavior , distribution co-ordination misbehavior and MAC protocol misbehaviors. Due to these a large number of a data loss and the missing of the important information’s,losses are achieved by the hackers. This wireless medium does not contain the facility of detecting the things happening around but, where it has happened and what has happened and what has been done can be detected. To avoid such conditional behavior, the introduction of the DOMINO detector is used within the connections to make them secure.

Keywords


IEEE 802.11, MAC, DOMINO.

Cite this article


S. SheikAbdulla, N. ArunKumar, B. lokeshAravind, . Thivaharan, “Real-Time Unauthorized Access Detection in Wired or Wireless Networks: using Domino Concept” INTERNATIONAL JOURNAL OF ADVANCED INFORMATION AND COMMUNICATION TECHNOLOGY, pp.888-890, July 05, 2018.

Copyright


© 2018 S. SheikAbdulla, N. ArunKumar, B. lokeshAravind, S. Thivaharan. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.