Selective on-demand protocol for finding reliable nodes to form stable paths in ADHOC networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
A wireless adhoc network consists of a group of wireless nodes which can dynamically self-organize themselves into a temporary topology to form a network without using any existing infrastructure. Generally adhoc networks are formed only when there is need and maintained for one time purpose. Node mobility is one of the significant factors that decreases the performance of adhoc networks and restricts network stability. Selection of reliable paths is an effective way to tackle the node mobility problem. Current methods of reliable path selection suffer from various shortcomings (Ex: More hardware requirements). In adhoc networks, mobility of the nodes causes frequent link failures; due to this, routes are disconnected. So route selection and topology maintenance is a challenging issue. In this work, we propose a method for identifying set of reliable adjacent nodes in the network and extends the capabilities of AODV routing protocol. Simulation results show that our approach is better than the traditional AODV routing protocol.
Authors and Affiliations
T. Rajamohan Reddy , N. Sobharani,
Analyzing Knowledge Based Feature Selection to Detect Remote to Local Attacks
Intrusion Detection (ID) is the most significant component in Network Security System as it is responsible to detect several types of attacks. The IDS commonly deals with a large amount of data traffic, which involves ir...
Low Power And Area Efficiency of SHA-1 and SHA-2 Hash Algorithm
This paper summarizes about the design of a Low Power and Efficiency of SHA-1 and SHA-2 Hash Functions capable of performing all members of the Secure Hash Algorithm (SHA) group of Hash Functions. The need for high-s...
VirtuaGuard: Intrusion Detection System on Static and Dynamic Web Applications
In this project, we propose an efficient IDS system called as VirtuaGuard system that models the network behavior for multilayered web applications of user sessions across both front-end web (HTTP) requests and back...
Improvement of the SARA strategies for MANET model
Wireless ad-hoc networks are autonomous systems composed of mobile hosts that are free to move around arbitrarily. Routing is difficult in MANET’s since mobility may cause radio links to break frequently. When any...
Healthcare Information Technology Service Assessment: A Healthcare Leader Prospective
Information technology has evolved over the years and comply its presence in all the industrial sectors and healthcare is not an exception. It has become more and more necessary for every health care professional...