Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Chandrasekar, C.
- Reducing the Time Delay of Backbone Networks
Abstract Views :268 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Science, Sree Narayana Guru College, K. G. Chavadi, Coimbatore, IN
2 Sree Narayana Guru College, K. G. Chavadi, Coimbatore, IN
1 Department of Computer Science, Sree Narayana Guru College, K. G. Chavadi, Coimbatore, IN
2 Sree Narayana Guru College, K. G. Chavadi, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 6, No 8 (2014), Pagination: 323-327Abstract
There is a several types of sleep wake scheduling protocols have been suggested in the research survey. One of the sleep wakes scheduling protocol have been proposed as Synchronized sleep wake scheduling. The sensor nodes are periodically or a periodically exchange the synchronization information with neighbor nodes using these protocols. Though, additional communication overhead and a considerable amount of energy are consumed using such synchronization procedures. On-demand sleep, wake scheduling protocols has been projected, where nodes turn off most of their circuitry and always work on a secondary low-powered receiver to listen to “wake-up” calls from neighboring nodes when there is a need for relaying packets. The costs of sensor motes are increase significantly using on-demand sleep wake due to the additional receiver. In this paper, the proposals of sleep wake scheduling protocols are interested to use the asynchronous techniques such as those proposed. In these protocols, each node wakes up independently of neighboring nodes in order to save energy. An additional delay are included due to the independence of the wake-up processes at each node along the path to sink for the reason that each node needs to wait for its next-hop node to wake up before it can transmit the packet. This delay could be unacceptable for delay-sensitive applications like fire detection or a tsunami alarm and which requires the event reporting delay to be small.Keywords
Sleep-Wake, Sensor Node, Wireless Networks, Energy.- Extending AODV to Avoid Black Hole Attack (AOMDV)
Abstract Views :276 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Science at Sree Narayana Guru College, K.G.Chavadi, Coimbatore, Tamilnadu, IN
2 Computer Science from the Bharathiar University, Coimbatore, Tamilnadu, IN
1 Department of Computer Science at Sree Narayana Guru College, K.G.Chavadi, Coimbatore, Tamilnadu, IN
2 Computer Science from the Bharathiar University, Coimbatore, Tamilnadu, IN
Source
Networking and Communication Engineering, Vol 5, No 11 (2013), Pagination: 476-482Abstract
A Mobile Ad-hoc Network (MANET) is a dynamic wireless network that can be formulated without the need for any pre-existing infrastructure in which each node can act as a router. One of the main challenges of MANET is the design of robust routing protocol that adapt to the frequent and randomly changing network topology. A variety of routing protocols have been proposed and most of them have been extensively simulated or implemented as well. Several attacks are possible in the available routing protocols such as Wormhole attack, black hole attack, byzantine attack, etc. Among these attacks black hole attack is of major concern in AODV, is one of the popular routing protocols for MANET. Due to security vulnerabilities of the AODV routing protocol, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack. In this study, analyzed the use of AOMDV (Ad-hoc On-demand Multipath Distance Vector) and improved the security of MANET against the black hole attack. The main objective is to provide security against the Black hole attack.Keywords
MANET, Black Hole Attack, AODV, AOMDV.- Secured Routing Protocol Based on Secret Sharing in Voice Systems
Abstract Views :260 |
PDF Views:1
Authors
Affiliations
1 Manonmaniam Sundaranar University, Tirunelveli, IN
2 Sree Narayana Guru College, Coimbatore-641105, IN
1 Manonmaniam Sundaranar University, Tirunelveli, IN
2 Sree Narayana Guru College, Coimbatore-641105, IN
Source
Networking and Communication Engineering, Vol 5, No 1 (2013), Pagination: 33-38Abstract
Voice over IP is the process of transmission of voice over packet-switched IP networks is one of the most important emerging trends in telecommunications. The VOIP introduces both security risks and opportunities. VOIP has a very different architecture than traditional circuit-based telephony, and these differences result in significant security issues. Lower cost and greater flexibility are among the promises of VOIP for the enterprise, but VOIP should not be installed without careful consideration of the security problems introduced. VOIP systems take a wide variety of forms, including traditional telephone handsets, conferencing units, and mobile units. In addition to end-user equipment, VOIP systems include a variety of other components, including call processors/call managers, gateways, routers, firewalls, and protocols. Most of these components have counterparts used in data networks, but the performance demands of VOIP mean that ordinary network software and hardware must be supplemented with special VOIP components. Quality of Service (QoS) is fundamental to the operation of a VOIP network that meets users’ quality expectations. However, the implementation of various security measures can cause a marked deterioration in QoS. These complications range from firewalls delaying or blocking call setups to encryption-produced latency and delay variation (jitter). Because of the time-critical nature of VOIP, and its low tolerance for disruption and packet loss, many security measures implemented in traditional data networks are simply not applicable to VOIP in their current form; firewalls, intrusion detection systems, and other components must be specialized for VOIP. Thus an anonymous multipath routing protocol that is a secured protocol called AOMDV, based on secret sharing is proposed. The protocol provides identity anonymity, location anonymity, data and traffic anonymity by employing cryptograph technology and secret sharing in VOIP communication process. Simulation results show that the proposed scheme provides a reasonably good level of network security.Keywords
Voice Over IP, AOMDV, Quality of Service, Multipath Routing, Secret Sharing, Anonymity.- Secured Multipath Routing Protocol for Black Hole Attacks Based on Secret Sharing in MANETs
Abstract Views :266 |
PDF Views:3
Authors
Affiliations
1 Manonmaniam Sundaranar University, Tirunelveli, IN
2 Sree Narayana Guru College, Coimbatore – 641 105, IN
1 Manonmaniam Sundaranar University, Tirunelveli, IN
2 Sree Narayana Guru College, Coimbatore – 641 105, IN