Trust Worthy Architecture Implementation for Mobile Ad hoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7
Abstract
A mobile ad hoc network is a wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. The wireless and distributed nature of mobile ad hoc networks poses greater challenges like security, mobility, scalability, reliability and other attributes of trust worthy communication. In this paper we implemented a framework for mobile ad hoc networks by checking the simulation for various service metrics of mobile ad hoc networks. This framework implementation also provides optimum quality of service metrics, while being readily adaptable to widely differing applications, different hardware and software providers and changing technologies..
Authors and Affiliations
D. Saravanan , R. M. Chandrasekaran , B. Vishnu Prabha , V. R. Sarma Dhulipala
Detection of threats in Honeynet using Honeywall
Information is a strategic resource and to protect this kind of confidential and private data against possible attacks, you must take into account some security mechanisms and measures. And as Computer network are subjec...
AN APPROACH ORIENTED TOWARDS ENHANCING A METRIC PERFORMANCE
Software Engineering like all other engineering professions has metrics and Software metrics are increasingly playing a central role in the planning and control of software development projects [2]. A software metric is...
Assessment of Fraud Pretentious Business Region Research Articles Using Data Mining Approaches
In any organization, fraud detection and prevention is daunting task because millions of dollars lost with the different nature of fraudulent activities. Organizations got to engage intelligent and innovative techniques...
Automatic Web Image Categorization by Image Content:A case study with Web Document Images
Crawling in Web images has become a challenging problem today due to its rising popularity. Among the most valuable Web assets, Categorizing images on the Web is quite difficult. This paper proposes a simple and effectiv...
Iris Recognition Based On Its Texture Patterns
A biometric system uniquely identifies and authenticates humans based on their physical or behavioural features. Iris recognition is one of the most reliable methods of biometric authentication that recognizes a person b...