Trust-based Routing Security in MANETS
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
The advantage of Mobile Ad-hoc Networks (MANETs) is to orm a wireless network in the absence of fixed infrastructure. arly stages of routing protocols of MANETs were, incapable of handling security issues but by the introduction of newer techniques like cryptographic techniques enabled them o handle the routing information securely. The present paper etails the newly proposed SAODV and TAODV and further ompares the same with the existing MANET routing protocols.
Authors and Affiliations
R. Balakrishna , U. Rajeswar Rao , G. A. Ramachandra , M. S. Bhagyashekar
Security of Data Fragmentation and Replication over Un-trusted Hosts Arun Kumar Yadav, Dr. Ajay Agarwal
Data replication technique is used to avoid the fault tolerance and improve the performance .With this initiation of content delivery networks, it is becoming more and more frequent that data content is placed on hosts t...
Performance Comparision of Image Retrieval using Row Mean of Transformed Column Image
The paper presents innovative content based image retrieval (CBIR) techniques based on row mean of transformed column image as feature vector. For proposed CBIR techniques three different image transforms like Discrete C...
Security For Wireless Sensor Network
Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodes communicate among them...
GRID SCHEDULING USING ENHANCED PSO ALGORITHM
Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on. T...
Optimization of Association Rule Mining through Genetic Algorithm
Strong rule generation is an important area of data mining. In this paper we design a novel method for generation of strong rule. In which a general Apriori algorithm is used to generate the rules after that we use the o...