[ns] Help for SYN and Smurf attack

2013-03-21 Thread Vidya S

Hi...

I want codes to implement SYN and SMURF attack.

Regards,
vidya


[ns] struck in simulating voice over 802.11b--please help

2013-03-21 Thread Puneet Agrawal

I couldnt implement multiple channel on 802.11b.

Therefore couldnt apply next hop selection algorithm.
Kindly help me with creating multiple channels & assigning them to each nodes.

Thanks in advance


[ns] CFP (Extended Deadline) : S.I. on Intrusion Detection and Security Mechanisms for WSNs

2013-03-21 Thread Jaime Lloret Mauri


Special Issue on Intrusion Detection and Security Mechanisms for Wireless 
Sensor Networks

International Journal of Distributed Sensor Networks
ISI Thomson Impact Factor (2011): 0.203

Call for Papers

Wireless sensor networks are gaining significant interest from academia and 
industry. Wireless sensor networks are multihop, self-organizing, self-healing, 
and distributed in nature. These characteristics also increase vulnerability 
and expose sensor networks to various kinds of security attacks. Advance 
security mechanisms and intrusion detection systems (IDSs) can play an 
important role in detecting and preventing security attacks.

This special issue aims to gather recent advances in the area of security 
aspect of wireless sensor networks. It welcomes research and review articles 
that focus on the challenges and the state-of-the-art solutions. The papers 
will be peer reviewed and will be selected on the basis of their quality and 
relevance to the topic of this special issue. Potential topics include, but are 
not limited to:

• Intrusion detection systems
• Secure neighbor discovery, localization, and mobility
• Security architectures, deployments, and solutions
• Denial of service attacks and countermeasures
• Intrusion prevention techniques
• Adaptive defense systems
• Trust establishment and privacy
• Confidentiality, integrity, and availability assurance
• Authentication and access control
• Secure routing protocols
• Cryptography, encryption algorithms, and key management schemes
• Experimental validation and experiences with testbed and/or deployment

Before submission authors should carefully read over the journal's Author 
Guidelines, which are located at 
http://www.hindawi.com/journals/ijdsn/guidelines/. Prospective authors should 
submit an electronic copy of their complete manuscript through the journal 
Manuscript Tracking System at 
http://mts.hindawi.com/author/submit/journals/ijdsn/ids/ according to the 
following timetable:

Manuscript Due  Friday, 1 April 2013 (Extended)
First Round of Reviews  Friday, 24 May 2013
Publication DateFriday, 19 July 2013

Lead Guest Editor

S. Khan, IIT, Kohat University of Science and Technology (KUST), Kohat, Pakistan

Guest Editors

Jaime Lloret, Integrated Management Coastal Research Institute, Polytechnic 
University of Valencia, Valencia, Spain
Jonathan Loo, School of Engineering and Information Sciences, Middlesex 
University, London, UK



[ns] Help for project work

2013-03-21 Thread Vidya S

hi sir,

How to drop packets for certain period?


Re: [ns] error with configure (Khadijeh Arabi)

2013-03-21 Thread montather aladdab

dir khadijeh,i thank your problem in authentication, i mean you must run you 
code under the admin user ( go to terminal write su then enter then write your 
password and put your code in ns2 and now can you make and compiler your code ) 
if you need any thank to ask feel free.

muntadher isam