A Secure QOS Distributed Routing Protocol for Hybrid WirelessNetworks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service(QoS) requirements in real time transmission for wireless application. But it stream including critical missionapplication like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem inMobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable tomalicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybridwireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) toupgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain twocontrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmissiontime. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wirelessnetworks from attacks that have higher malicious behavior detection rate. Analytical and simulation resultbased on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusiondetection, overhead, transmission delay.
Authors and Affiliations
S. Aakasham , S. R. Mugunthan
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
Abstract: The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge or spoof the source addresses i...
Performance Analysis of Compression Techniques Using SVD,BTC, DCT and GP
Abstract: Digital image compression techniques minimize the size in bytes of a graphics file without degradingthe quality of the image to an acceptable level. The reduction in file size allows more images to be sto...
An Indepth Understanding of e-Governance initiatives: e-Procurement- A Great Success in Odisha
Modeling and Processing of Cloud Computing and It’s Performance Measurement
Abstract: Cloud computing is the growing technology of large scale distributed computing. It provides ondemand access to distributed resources, which are available in open environment on paid basis. Because all most all...
Probabilistic Model for Single and Multi-Sensing Intrusion Detection in Wireless Sensor Networks
Wireless Sensor Networks consists of tiny devices capable of processing, routing the sensed data and are capable of detecting the intruders. The process of detecting any suspected (anomalous) moving object(attacke...