A new Security approach for integrating wireless adhoc network using octant bit computation and routing test
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 6
Abstract
Ad hoc networks are a kind of network that has no centralized body and in order to communicate with the nodes it has no fixed topology.In this paper we propose to use binary masking of octant bits and shared cryptography to secure message communication in adhoc network and we have proposed a minimized computational security scheme for wireless ad-hoc network based on shared information between source host and destination host .We also can focus on routing test before transferring packet because , no of packet increases due to binary masking technique. With the help of this method we make the virtual path between source and destination. That makes it more effective in energy saving distributed environment where battery driven low end processors are used and security is also a major challenge.
Authors and Affiliations
Sushmita Silwal| TMU University, Moradabad, Uttar Pradesh, India, sushmitasilwaliftm@gmail.com, Anu Sharma| TMU University, Moradabad, Uttar Pradesh, India, er.anusharma@gmail.com
DYNAMIC PERFORMANCE IMPROVEMENT OF INDUCTION MOTOR USING RADR CONTROLLER
Induction Motors are widely used in Industries, because of the low maintenance and robustness. Speed Control of Induction motor can be obtained by maximum torque and efficiency. Apart from other techniques Artificial...
A Distributed Clone Detection Protocol Considering Clone Detection Probability, Network Lifetime and Data Buffer Storage
We propose an energy-efficient location-aware clone location convention in thickly conveyed WSNs, which can ensure successful clone attack recognition and keep up attractive system lifetime. In particular, we misuse...
A Novel System for Scalable Data Sharing in Cloud Storage using Key-Aggregate
Of late, rapid growth observed in the cloud technology. Data sharing is an essential functionality in cloud storage. In this paper, we show how to efficiently, securely and flexibly share data with others in cloud sto...
Dynamic Power channel for force using so as to mold Space Vector Modulation controller
In this undertaking, introduces a control system for cross breed dynamic force channel utilizing Space Vector Pulse Width Modulation (SVPWM). In the proposed control system, the Active Power Filter (APF) reference vo...
Analyzation Of The Scalability Problems Of Distributed Presence Server Architectures
A mobile presence service is an important factor of social network services in cloud computing environments. The key function of a mobile presence service is to maintain an up-to-date list of presence information of...