Remove the black-hole attack in mobile ADHOC network using Threshold Based Technique
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 12
Abstract
In this paper enhanced the AODV routing protocol for the prevention of black hole attack. The enhanced AODV routing protocol based on the principle of thresholding. The thresholding using the concept of reference node selection process. The reference node selection process creates two group of node one is path altered group and other is stable path with sensibility. The sensibility path estimates the hop count and packet sequence number. If the number of hop count is not changed or the sequence of packet is also not lost is called sensitivity path of network. The function of threshold generated by the node distance formula based on the Euclidean distance derivation. The enhanced AODV protocol simulate in NS2.34 simulators and measure some standard parameter such as PDR, throughput, overload and E2E delivery ratio.
Authors and Affiliations
Sanjay Yadav, Kaptan Singh
A Feature Selection process Optimization in multi-class Miner for Stream Data Classification
Multi-class miner resolves the problem of feature evaluation, data drift and concept evaluation of stream data classification. The process of stream data classification in multi-class miner based on ensemble technique of...
PRIVACY PRESERVING CLUSTERING BASED ON SINGULAR VALUE DECOMPOSITION AND GEOMETRIC DATA PERTURBATION
Privacy preservation is a major concern when the application of data mining techniques to large repositories of data consists of personal, sensitive and confidential information. Singular Value Decomposition (SVD) is a m...
Study of Image steganography using LSB, DFT and DWT
In this paper we have studied and implement the color image steganography using LSB, DFT and DWT. First we have studied the various literatures of LSB, DFT and DWT and then implemented one system in which we can do stega...
A REVIEW ON MULTIQUERY SYSTEM FOR CONTENT BASED IMAGE RETRIEVAL
In recent years, very large collections of images and videos have grown rapidly. In parallel with this growth, content-based retrieval and querying the indexed collections are required to access visual information. Two o...
Major Energy Efficient Routing Schemes in Wireless Sensor Networks: Survey and Idea
Sensing the environment without human intervention is carried out with Wireless Sensor Networks. Thus WSNs have gained impetus in every field as applicable to various sensing applications. As the sensor nodes are very mi...