Mobile Ad Hoc Networks Authentication Using NPV Method.
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
NPV (neighbour position verification) method is companionable with security architectures counting the ones that havebeen projected for vehicular networks whichsymbolize a likely deployment environment for NPV.Such a situation is of particular interest since it leaves thedoor open for adversarial nodes to misuse or disturb thelocation-based services.Wedeal withthe open issue by suggesting a completelycirculated cooperative solution that is robust against independent andcolluding adversaries and can be weaken only by an overwhelming presence of adversaries.
Authors and Affiliations
Koneru Sudhir, Rajesh Babu Nagineni
Vigorous Data Provision And Organization By Using Gossip Protocol
Cloud computing is focused on virtual mechanism data storage and sharing on web services. The cloud environment consists of several elements such as clients and distributions. It includes fault tolerance, high availa...
Finest Lag Broadcast for Multihop Wireless Associations Exhausting Self-Interference Termination
In Wireless Networks a large portion of wireless broadcast protocols show conventions vigorously depend on the MAC 802.11-based CSMA/CA Protocol. This Protocol will evades impedance and crash by moderate planning of...
VHDL Implementation of High Speed Fault Injection Tool for testing FPGA based designs
Fault injection is mainly used to test and evaluate the fault-tolerance based designs. In current VLSI technology fault injection has become a popular technique for experimentally determining dependability parameters...
Feedback Driven Load Profile for Software Applications
Running a Preproduction system load testing with a feedback from Production system is a vital for the strength of the Production system against Performance Failures. During Performance Testing Lifecycle in two importa...
High Performance of Fault Detection And Correction Technique Using Difference Set Codes For Memory Applications
The advanced combination technologies made it possible for accessing any device so fast that within a portion of seconds the job can be performed. Now days fast memories exists everywhere during accessing if any erro...