Performance Analysis of Malicious nodes on Multi hop Cellular Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 7
Abstract
The existence of malicious nodes in multi hop cellular networks, which operate without a central administration infrastructure, can result in performance degradation or even disruption of the network operation. In this paper we proposed some approaches to analysis the consequences caused by malicious nodes in networks. We analyzed and reported the simulation result, that the effect on performance of network when malicious node present in it. Based on our past report on the behavior of all nodes we will achieve higher levels of security and reliability by utilizing them. To reduce the public key cryptography operations we will use light weight hashing operations along with the routes between source and destination.The proposed model improves all the drawbacks of multi hop cellular networks, which excludes and if not possible, minimizes the number of malicious node in the routes.
Authors and Affiliations
G. Vidhisha Yadav, N. Ramanjaneya Reddy, U. Sesadri
Design and Implementation of RSA Algorithm using FPGA
RSA cryptographic algorithm used to encrypt and decrypt the messages to send it over the secure transmission channel like internet. The RSA algorithm is a secure, high quality, public key algorithm. In this paper, a ne...
Software Quality
In the given paper I present the information regarding quality metrics. Different quality factors can be imposing with relation to cost, schedule and rework. It’s very important to make quality assurance plans. For tha...
A NOVEL METHOD OF COLOR IMAGE ENHANCEMENT BY COLOR SPACE TRANSFORMATION FOLLOWED BY GAMMA/LOGARITHMIC TRANSFORMATION
Visual enhancement of image plays a very important role in the field of medical imaging. Enhanced medical images are more suitable for analysis and proper diagnosis. We present a novel method of enhancement of color medi...
REVIEW OF DATABASE AND PROMINENT PROGRAMMES
Databases and database systems have become an essential component of everyday life in modern society. In the course of a day, most of us encounter several activities that involve some interaction with a database. For exa...
Modeling and Implementation of a Scheduling of Information to maximize processing in a Network Telecommunications
The computer networks are based on the Internet protocol conceived from the origin to transport data in more heterogeneous usage (telephony IP, video at request, distributed interactive games, telemedicine, video-confere...