Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 4
Abstract
Securing crucial information is always considered as one of the complex, critical, and a time-consuming task. This research investigates a significant threat to the security of a network, i.e., selective forwarding attack. Protection of information is considered as the main stimulating task in the design of an information system for an organization. The research work proposes a framework that detects the selective forwarding attacks and computes the harmful hosts residing an ad-hoc structure. Our solution is further split into two phases: initial phase is the detection of selective forwarding attacks and the second phase performs the identification of malicious nodes. Performance of the proposed model is evaluated based on the network throughput, which is for the enhancement of security. Simulation of the proposed model is performed using NetLogo and the results show an improvement of 20% in throughput of the network.
Authors and Affiliations
Masroor Ali, Zahid Ullah, Meharban Khan, Abdul Hafeez
Denoising in Wavelet Domain Using Probabilistic Graphical Models
Denoising of real world images that are degraded by Gaussian noise is a long established problem in statistical signal processing. The existing models in time-frequency domain typically model the wavelet coefficients as...
Throughput Analysis of Ieee802.11b Wireless Lan With One Access Point Using Opnet Simulator
This paper analyzes the throughput performance of IEEE 802.11b Wireless Local Area Network (WLAN) with one access point. The IEEE 802.11b is a wireless protocol standard. In this paper, a wireless network was estab...
Electronic Human Resource Management (e-HRM) of Hotel Business in Phuket
This research aims to study the pattern of the electronic human resources management (e-HRM) of the hotel business in Phuket. The study is conducted with the implementation of field data and in-depth interview of hotels’...
Effectiveness of Iphone’s Touch ID: KSA Case Study
A new trend of incorporating Touch ID sensors in mobile devices is appearing. Last year, Apple released a new model of its famous iPhone (5s). One of the most anticipated and hailed features of the new device was its Tou...
Semantic Similarity Calculation of Chinese Word
This paper puts forward a two layers computing method to calculate semantic similarity of Chinese word. Firstly, using Latent Dirichlet Allocation (LDA) subject model to generate subject spatial domain. Then mapping word...