Remove the black-hole attack in mobile ADHOC network using Threshold Based Technique
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 12
Abstract
In this paper enhanced the AODV routing protocol for the prevention of black hole attack. The enhanced AODV routing protocol based on the principle of thresholding. The thresholding using the concept of reference node selection process. The reference node selection process creates two group of node one is path altered group and other is stable path with sensibility. The sensibility path estimates the hop count and packet sequence number. If the number of hop count is not changed or the sequence of packet is also not lost is called sensitivity path of network. The function of threshold generated by the node distance formula based on the Euclidean distance derivation. The enhanced AODV protocol simulate in NS2.34 simulators and measure some standard parameter such as PDR, throughput, overload and E2E delivery ratio.
Authors and Affiliations
Sanjay Yadav, Kaptan Singh
Enhancing the Performance of the BackPropagation for Deep Neural Network
The standard Backpropagation Neural Network (BPNN) Algorithm is widely used in solving many real problems in world. But the backpropagation suffers from different difficulties such as the slow convergence and convergence...
ALTERNATIVES OF PROVIDING IPTV USING IP MULTIMEDIA SUBSYSTEM
In this paper, we specify the realization of IPTV platform based on IMS. We provide an analysis of advantages and disadvantages of possible alternatives of providing IPTV over IMS. On the example, which is contained in t...
Effect of Weight Factor on The Performance of Hybrid Column Wavelet Transform used for Watermarking under Various Attacks.
Digital image watermarking is aimed at copyright protection of digital images. Strength of embedded watermark plays an important role in robustness and invisibility of watermarking technique. In this paper, effect of two...
A New Approach For Load Balancing In Cloud Computing
Cloud computing is the dynamic delivery of information technology resources and capabilities as a service over the Internet. Cloud computing is a style of computing in which dynamically scalable and often virtualized res...
EFFECT OF CHEMICAL REACTION ON MHD FLOW OF A VISCO-ELASTIC (WALTER'S LIQUID MODEL-B) FLUID THROUGH POROUS MEDIUM WITH HEAT SOURCE
In this paper we have studied and discussed the problem of unsteady flow of a visco-elastic (walter’s liquid model B) fluid through porous medium in presence of a heat source and a uniform magnetic field with effect of...