Ad hoc Network and its Security Essentials
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 2
Abstract
This In this paper we present an analysis of ad hoc network and how the attacks are prominence on the ad hoc network. Basically ad hoc network is a combination of several nodes which are linked over without wires which means wireless medium is used for this topology. In addition, ad hoc networks are design for particular environment even though it works in most difficult surrounds. Security aspects are more new in ad hoc networks as compares to old networks, still ad hoc networks are faces many security problems in current scenario. Due to the environment specific nature of the ad hoc networks its implementation is not as easy as we think. In this article we also discuss some security attacks.
Authors and Affiliations
Monika Kohli
A Novel Maximum Power Point Tracking Method Based on Extension Theory for Wind Energy Conversion System
This paper proposed an intelligent maximum-power-point tracking algorithm to fully utilize wind energy conversation system (WECS) output power that depends on wind speed. The proposed method has been applied to a wind tu...
Survey Paper on Reactive (on-demand )- Topology Based Routing Protocol in VANET
VANET (Vehicular Ad-hoc Network) has become a remarkable and emerging area for research analysis and development. VANET is a subgroup of MANET (Mobile Ad-hoc Network). VANET and MANET both are wireless networks which are...
Different Algorithms used in Image Encryption: A review
As a result of the development of computer network technology, communication of information through personal computer is becoming more convenient. Meanwhile, it also gives hackers opportunities to attack the network. The...
PPCLSS: Probabilistic Prediction Coefficient Link Stability Scheme based Routing in MANETs
Ensuring the stability of a link in MANETs is mandatory to prolong the lifetime of a network. Probabilistic Prediction Coefficient Link Stability Scheme (PPCLSS) based routing is proposed for MANETS. Link loss is found b...
Comparative study about Digital Image Watermarking Using DCT and robustness testing of technique
In the today’s world of rapidly growing internet services (Commercial and educational), security always comes in picture even at low level. Same way in the field of Information Technology and Computer Science and Enginee...