Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1

Abstract

: Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile adhoc network. In our Proposed Method we are considering the multiple characteristics of nodes. In this we use all the parameter that is necessary in AODV. For simulation purpose we use the probabilistic neural network approach that gives more efficient and accurate results as comparison to the clustering algorithm in the previous systems was used. The performance of PNN (probabilistic neural network) approach is improved  for identifying the particular attack like as wormholes, black holes  and selfish

Authors and Affiliations

Manoj Patel, Dr. Maneesh Shrivastava, Kavita Deshmukh

Keywords

Related Articles

TEDDEEC: Threshold Enhanced Developed Distributed Energy-Efficient Clustering Protocol for Heterogeneous Wireless Sensor Networks

In wireless sensor networks, hundreds or thousands of sensor networks are deployed in a field to sense data (like temperature, light, pressure, sound etc.) and then they transmit it to sink nodes or base station via a ra...

A comparative study of chain based routing algorithms in wireless sensor networks

Many routing algorithms for Wireless Sensor Networks (WSNs) are designed and presented in the literature. The main target of these algorithms is to improve the performance of WSNs. In this paper, a comparative study of c...

Steganography: Securing Message in wireless network

Steganography is the process of hiding a secret message with in a cover medium. However eavesdropper may guess the embedding algorithm like least significant bit (LSB) replacement of Chan et al, 2004; Wang et al, 2001; W...

Mineral Exploation Using Neural Netowrks

Establishing a new site for mining operation is required to find and develop a new source of minerals with precise characteristics such as location, depth, quality and thickness. Mineral exploration is a sequential proce...

HTSCC A Hybrid Task Scheduling Algorithm in Cloud Computing Environment

Nowadays, cloud computing makes it possible for users to use the computing resources like application, software, and hardware, etc., on pay as use model via the internet. One of the core and challenging issue in cloud co...

Download PDF file
  • EP ID EP649853
  • DOI 10.24297/ijct.v3i1b.2746
  • Views 109
  • Downloads 0

How To Cite

Manoj Patel, Dr. Maneesh Shrivastava, Kavita Deshmukh (2012). Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 3(1), 91-94. https://europub.co.uk/articles/-A-649853