Remove the black-hole attack in mobile ADHOC network using Threshold Based Technique
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 12
Abstract
In this paper enhanced the AODV routing protocol for the prevention of black hole attack. The enhanced AODV routing protocol based on the principle of thresholding. The thresholding using the concept of reference node selection process. The reference node selection process creates two group of node one is path altered group and other is stable path with sensibility. The sensibility path estimates the hop count and packet sequence number. If the number of hop count is not changed or the sequence of packet is also not lost is called sensitivity path of network. The function of threshold generated by the node distance formula based on the Euclidean distance derivation. The enhanced AODV protocol simulate in NS2.34 simulators and measure some standard parameter such as PDR, throughput, overload and E2E delivery ratio.
Authors and Affiliations
Sanjay Yadav, Kaptan Singh
COMPACT CPW FED ANTENNA HAVING DUAL AND INVERTED BEAKER SHAPED FOR WLAN/WIMAX OPERATIONS
In recent years, great interest is focused on microstrip antennas for their small volumes, low profiles, good integration, low costs and good performance. With the continuous growth of wireless and mobile communication s...
Semantic Web for Virtual University Using XML and Relational Database
In this paper a development of virtual university semantic web service is focused. This approach uses XML, relational database and development of a web application to store, retrieve, and transfer operative notes between...
SIAVA: Secret Information Aggregation Design for Various Applications in Wireless Sensor Networks
In general information aggregation design that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggreg...
A Seismic Data Processing System based on Fast Distributed File System
Big data has attracted an increasingly number of attentions with the advent of the cloud era, and in the field of seismic exploration, the amount of data created by seismic exploration has also experienced an incredible...
Issues and Emerging Trends in Identity Management
In todays digital age as companies are moving more and more amounts of important, sensitive data, information, applications, and infrastructure online there is a need toestablish and maintain credentials on all the conne...