Effect of Enhancing MAC layer Security and Power Saving Mode on Mobile Ad Hoc Network
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 7
Abstract
Mobile Ad Hoc Network is the wireless network with no centralized monitoring system. The nodes are free to move anywhere in the network. These mobile nodes also act as routers and make the routes for any data transmission on their own. They take the responsibility of route discovery and packet transmission of other. This cooperative approach of packet transmission has made these ad hoc networks much popular. Due to lack of infrastructure and centralized monitoring system, these networks are vulnerable to the security threat. If there is an intruder among the mobile nodes, the whole system can be damaged to the large extent. Since there is no central framework to monitor the security issues, mobile nodes have to implement their own security feature. The security feature, that is to be implemented on the network, must pass through simulation so that the actual effect of it on the performance of network may be analyzed prior to its implementation. This paper focuses on the effects of adding MAC layer security feature to the mobile ad hoc networks. Also the effect of adding power saving mode, which dominates the co-operative behavior of mobile nodes, has been discussed. This analysis gives a better picture for the implementation of routing protocols.
Authors and Affiliations
Sneha Kanchan , Poonam Mittal , Dr. C. K. Nagpal
An Improved Montgomery’s Method Over Public-Key Cryptosystem
This paper deals with improving Montgomery’s algorithm. We improve mongomery’s algorithm such that modular multiplications can be executed two times faster. Each iteration in our algorithm requires only one addition, whi...
Exploratory Data Analysis of Turbulent Flows
Large Eddy Simulations (LES) contains 3D instantaneous velocity fields as well as passive scalar concentration field describing the coherent flow structures. The study of coherent flow structures has a major impact on th...
MINING ALGORITHM FOR XML QUERY-ANSWERING SUPPORT
In this current world, we come across digital information available on the web like e-business transaction, e-shopping, e-learning etc., These XML documents are outsized and so the datasets returned as a answer query is...
An Approach to Improve the Performance of Insertion Sort Algorithm
Sorting is a fundamental operation in computer science. Sorting means rearranging data in some order, such as ascending, descending with numerical data or alphabetically with character data. There are many sorting algori...
Review on Authorization control for a semantic data repository and database management system
Due to the increasing amount of data available online, the World Wide Web has becoming one of the most valuable resources for information retrievals and knowledge discoveries. The Semantic Web is well recognized as an ef...