Analysis of Routing Protocols in MANET
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 11
Abstract
Mobile Ad hoc Networks (MANET) use anonymous routing protocols that hide node identities and routes from outside observers in order to provide anonymity protection. Existing anonymous routing protocols relay on hop by hop encryption or redundant traffic by generation high cost. The high cost exacerbates the inherent resource constraint problem in MANETs. Existing anonymous routing protocols provides full anonymity for the data sources, destinations, routing path with increased cost, delay .It consumes the bandwidth of the network. In proposed multicast routing scheme, the network field is partitioned into multicast zones and each zone has a zone head. The data packets will be transferred through the nodes which satisfies the position verification test and the zones through with the packet is transferred is dynamic. Routing misbehavior is mitigated using witness nodes. The proposed system is evaluated in terms of delay, packet delivery ratio and energy consumption.
Authors and Affiliations
T. Saranya, M. Preetha
A Clustering Based Efficient Intrusion Detecting In Multitier Dynamic Web Applications
We present DoubleGuard, a system used to detect attacks in multitiered web services and classify through Hierarchal clustering Algorithm. Our approach can create normality models of isolated user sessions that include b...
FTP Based Honeypot Implementation Model for Network Security
In this paper, we have presented Network security using Honeypot technique that pretends to have one or more network vulnerabilities that a blackhat is looking for. But actually it does not have those vulnerabilities. I...
Generic Parser
This paper shows how to implement generic parsers as a family of streams. This allows for very readable, maintainable and flexible parsers. The method is illustrated with a parser for simple arithmetic expressions, but...
A Hybrid Technique for creating classification model using Random Committee and Voted Perceptron Classifier
Various researchers were experimenting with various manual or automated data sets, sometimes we found that due to high error rate various classification tasks of data mining lands into failure zone. This paper tries to...
Study of Security Concern & Challenges in Cloud Computing
The latest developments of information technology offered the people enjoyment and convenience. Cloud computing is one of the latest developments in the IT industry that’s give people full comforts and it also known as...