UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 1
January-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1901470


Registration ID:
195491

Page Number

563-568

Share This Article


Jetir RMS

Title

A Security Architecture to Mitigate Cross Layer Malicious Attacks in Lazy Receiver Processing (LRP) Network Subsystem

Abstract

Lazy Receiver Processing is new network subsystem architecture, which provides stable overload behavior, fair resource allocation, and high throughput under heavy load. All operating systems use sophisticated means of controlling the resources allocated to application processes. Policies like dynamic scheduling, memory allocation and swap memory are designed to ensure fair behavior of a timeshared system under various load conditions. The purpose of this paper is to provide a framework for understanding the Cross Layer attack in LRP based networks and evaluate its damage in the association. We made our simulations using NS-2 (Network Simulator version 2). Having implemented a detection and diffusion technique which simulates the cross layer attacks, we performed tests on diverse topologies to evaluate the network performance without and with malicious nodes in the LRP network. As expected, the throughput in the network was deteriorating considerably in the existence of a malicious nodes. Afterwards, proposed a solution to remove the malicious node effects in the LRP network in terms of packet delivery ratio, end-to-end delay, and throughput.

Key Words

LRP, MAC, Neighbors monitoring scheme

Cite This Article

"A Security Architecture to Mitigate Cross Layer Malicious Attacks in Lazy Receiver Processing (LRP) Network Subsystem", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 1, page no.563-568, January-2019, Available :http://www.jetir.org/papers/JETIR1901470.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A Security Architecture to Mitigate Cross Layer Malicious Attacks in Lazy Receiver Processing (LRP) Network Subsystem", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 1, page no. pp563-568, January-2019, Available at : http://www.jetir.org/papers/JETIR1901470.pdf

Publication Details

Published Paper ID: JETIR1901470
Registration ID: 195491
Published In: Volume 6 | Issue 1 | Year January-2019
DOI (Digital Object Identifier):
Page No: 563-568
Country: INDIA, INDIA, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003013

Print This Page

Current Call For Paper

Jetir RMS