A Modified Pass Based Identification Technique to Make ZRP Secure

Mobile ad hoc network comes with many advantages and applications in the situation where the time for recovery is very less. These advantages come along with some security risks. The approaches used to form MANET comes under three categories proactive, reactive and hybrid. The proactive and reactive has a vast research linked with them compared to the hybrid. The hybrid approach takes the advantage of both proactive and reactive. The hybrid has the advantage to follow the positives of both. In this paper, the implementation of a modified pass based identification and authorization technique is done over the hybrid protocol ZRP (Routing Protocol Zone) and analysis compared to the traditional available approach for ZRP is presented.

Spotlight

Cyber adAPT

Cyber adAPT® secures mobile-enabled enterprises protecting real-world reputations. It is the only platform to combine powerful Secure Device Management, guaranteeing secure access to cloud and network services, with real-time Attack Detection inside the network. Cyber adAPT instantly illuminates otherwise hidden, malicious behavior ensuring more real attacks are found more quickly.

OTHER WHITEPAPERS
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More
news image

How to Reduce the Risk of Phishing and Ransomware

whitePaper | March 21, 2021

Cybersecurity challenges abound for organizations across the world. The tsunami of phishing attacks that threaten account compromise, data breaches and malware infection remains a critical threat to neutralize. Ransomware is a second critical threat, with a well-played ransomware attack capable of bringing an organization to a complete halt, and in some cases putting it out of business permanently (e.g., Travelex1 and Vastaamo2.

Read More

Spotlight

Cyber adAPT

Cyber adAPT® secures mobile-enabled enterprises protecting real-world reputations. It is the only platform to combine powerful Secure Device Management, guaranteeing secure access to cloud and network services, with real-time Attack Detection inside the network. Cyber adAPT instantly illuminates otherwise hidden, malicious behavior ensuring more real attacks are found more quickly.

Events