Insight to Research Progress on Secure Routing in Wireless Ad hoc Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
Wireless Ad hoc Network offers a cost effective communication to the users free from any infrastructural dependencies. It is characterized by decentralized architecture, mobile nodes, dynamic topology, etc. that makes the network formation typically challenging. In the past decade, there has been a series of research work towards enhancing its routing performance by addressing various significant problems. This manuscript mainly orients around the progress being made in the line of secure routing protocol, which is still a bigger issue. The paper discusses different approaches undertaken by existing literature towards discrete security problem and explores the effective level of security. The study outcome of the paper finds that progress towards wireless ad hoc network is still very less and there is a need to come up with robust security framework. The paper also discusses the research gap being identified from the existing techniques and finally discusses the future work direction to address the certain unsolved problem.
Authors and Affiliations
Jyoti Neeli, N K Cauvery
User-Based Interaction for Content-Based Image Retrieval by Mining User Navigation Patterns.
In Internet, Multimedia and Image Databases image searching is a necessity. Content-Based Image Retrieval (CBIR) is an approach for image retrieval. With User interaction included in CBIR with Relevance Feedback (RF) tec...
A Comparative Analysis of Quality Assurance of Mobile Applications using Automated Testing Tools
Use of mobile applications are trending these days due to adoption of handheld mobile devices with operating systems such as Android, iOS and Windows. Delivering quality mobile apps is as important as in any other web or...
Finger Vein Recognition using Straight Line Approximation based on Ensemble Learning
Human identity recognition and protection of information security are current global concerns in this age of increasing information growth. Biometrics approach of defining identity is considered as one of the highly pote...
A computational linguistic approach to natural language processing with applications to garden path sentences analysis
This paper discusses the computational parsing of GP sentences. By an approach of combining computational linguistic methods, e.g. CFG, ATN and BNF, we analyze the various syntactic structures of pre-grammatical, common,...
Understanding a Co-Evolution Model of Business and IT for Dynamic Business Process Requirements
Organizations adapt existing business processes in order to become competitive but a change in a process affects other processes as well. In order to support the required change suitable technologies must be provided so...