Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
: Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile adhoc network. In our Proposed Method we are considering the multiple characteristics of nodes. In this we use all the parameter that is necessary in AODV. For simulation purpose we use the probabilistic neural network approach that gives more efficient and accurate results as comparison to the clustering algorithm in the previous systems was used. The performance of PNN (probabilistic neural network) approach is improved for identifying the particular attack like as wormholes, black holes and selfish
Authors and Affiliations
Manoj Patel, Dr. Maneesh Shrivastava, Kavita Deshmukh
TEDDEEC: Threshold Enhanced Developed Distributed Energy-Efficient Clustering Protocol for Heterogeneous Wireless Sensor Networks
In wireless sensor networks, hundreds or thousands of sensor networks are deployed in a field to sense data (like temperature, light, pressure, sound etc.) and then they transmit it to sink nodes or base station via a ra...
A comparative study of chain based routing algorithms in wireless sensor networks
Many routing algorithms for Wireless Sensor Networks (WSNs) are designed and presented in the literature. The main target of these algorithms is to improve the performance of WSNs. In this paper, a comparative study of c...
Steganography: Securing Message in wireless network
Steganography is the process of hiding a secret message with in a cover medium. However eavesdropper may guess the embedding algorithm like least significant bit (LSB) replacement of Chan et al, 2004; Wang et al, 2001; W...
Mineral Exploation Using Neural Netowrks
Establishing a new site for mining operation is required to find and develop a new source of minerals with precise characteristics such as location, depth, quality and thickness. Mineral exploration is a sequential proce...
HTSCC A Hybrid Task Scheduling Algorithm in Cloud Computing Environment
Nowadays, cloud computing makes it possible for users to use the computing resources like application, software, and hardware, etc., on pay as use model via the internet. One of the core and challenging issue in cloud co...