Enhancement in Elimination of Security Threads using Trusted Proactive Routing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 9, Issue 3
Abstract
Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It is possible that eventually a malicious node becomes easy to deploy in ad hoc n/w and they cause among other impact performance degradation. One attack that can deploy by malicious node is black hole attack. This paper reviews the problem of occurrence of black hole attack and its solution technique proposed enhancement in proactive routing protocol Destination Sequenced Distance Vector Routing protocol Using trust based and hop count method.
Authors and Affiliations
Shilpa Jaiswal
A Deterministic Heterogeneous Clustering Algorithm
Abstract: The energy supply of nodes will be limited strictly in the wireless sensor networks (WSN). Manyalgorithms propose to increase the efficiency of Sensor Networks. Many Clustering protocols have beenproposed to im...
An image compression using using discrete cosine transforms and JPEG enconder
The proposed Multiresolution decomposition through wavelets transform of fractals coded images reveal strong relationships limit the frequency content .The research is includes other extensions of the wavelet transform...
Spam Detection using Natural Language Processing
Abstract: Spam mails can be referred as unsolicited bulk email. These messages are used to advertise products and services for phishing purposes or to lead recipients to malicious sites with unethical intentions. A...
Qos Parameters of an Energy Efficient Multicast Congestion Control Protocol (Eemccp) Over Fading Channels
In this paper we propose an energy efficient multicasting congestion control protocol for mobile ad hoc networks (MANETs) over fading channels. Our proposed scheme overcomes the disadvantages of existing multicast conges...
Hybrid Cryptography Algorithms for Enhanced Adaptive Acknowledgment Secure in MANET
The mobile adhoc network is a group of mobile nodes without having the fixed infrastructure. Due to the infrastructure less network and distributed nature, make mobile adhoc network susceptible to malicious attack...