Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sheik Abdul Khader, P.
- Improving the Performance of Mobile Ad-Hoc Network Using Cross-Layer Design
Abstract Views :177 |
PDF Views:1
Authors
Affiliations
1 Sathyabama University, Chennai, IN
2 Department of CA, B.S.Abdur Rahman University, Chennai, IN
1 Sathyabama University, Chennai, IN
2 Department of CA, B.S.Abdur Rahman University, Chennai, IN
Source
Wireless Communication, Vol 3, No 6 (2011), Pagination: 427-431Abstract
Mobile ad-hoc network (MANET) is collection of wireless mobile hosts forming a temporary network with out the aid of any standalone infra structure or centralized administration. Mobile ad-hoc network have attributes such as wireless connection continuous changing topology, distributed operation and ease of deployment. Ad-hoc network has emerged as an important trend of future wireless systems that will provide ubiquitous wireless access. In this research we study that performance optimization challenges of ad-hoc network and cross layer processing to improve its performance. We implemented cross layer processing between physical (PHY), medium access control (MAC) and network (NET) layers using network simulator NS-2. The MAC layer adaptively selects a transmition data rate based on the channel signal strength information from the physical layer. The MAC layer utilization is sent to DSR routing protocol as a congestion aware routing metric for optimal route discovery.Keywords
MANET, MAC, DSR, Cellular Phones, Laptops, and PDAs.- Trust Based Authentication Key Distribution System for Mobile Ad Hoc Network
Abstract Views :145 |
PDF Views:1
Authors
Affiliations
1 Sathyabama University, Chennai 600 119, IN
2 Department of Computer Application, B. S. Abdur Rahman University, Vandalur, Chennai-600 048, IN
1 Sathyabama University, Chennai 600 119, IN
2 Department of Computer Application, B. S. Abdur Rahman University, Vandalur, Chennai-600 048, IN
Source
Wireless Communication, Vol 3, No 6 (2011), Pagination: 432-434Abstract
This paper is concerned towards providing trust based authentication key distribution system for mobile ad hoc network (MANET). Traditional authentication key distribution methods cannot be able to adopt for securing the MANET due to infrastructure less nature and lack of trust among nodes. We propose an authentication key distribution scheme for MANET which authenticates a node as well as provide a trust chain among nodes which enables secured and reliable key distribution. This paper also focuses on enhancing co-operation between nodes through trust chain.Keywords
MANET, Authentication Key, Security, Trust.- Cluster Adaptive Memory less Protocol for Anti-Collision in Low Cost Passive RFID Tags
Abstract Views :156 |
PDF Views:4
Authors
Affiliations
1 Department of Computer Applications, B.S. Abdur Rahman University, Vandalur, Chennai – 48, IN
2 Department of Computer Applications, B.S. Abdur Rahman University, Chennai, IN
3 Department of Computer Applications, B.S. Abdur Rahman University, Chennai – 48, IN
1 Department of Computer Applications, B.S. Abdur Rahman University, Vandalur, Chennai – 48, IN
2 Department of Computer Applications, B.S. Abdur Rahman University, Chennai, IN
3 Department of Computer Applications, B.S. Abdur Rahman University, Chennai – 48, IN
Source
Wireless Communication, Vol 2, No 8 (2010), Pagination: 223-231Abstract
RFID unlike barcodes enables simultaneous detection of multiple distant and non-line of sight objects. These characteristics make them exceptional and broaden its scope and utility of RFID systems. Signal transmissions from multiple tags result in tag collisions or confusion causing increase in identification delay, communication overhead and power consumption. In general conventional protocols, utilisation of time slots are in rise, when the tag population increases exponentially. The protocols suggested in recent years follow a “win one – loose other agreement”. Though BT, QT, variants of QT, AQS and ABS who show superiority in minimizing collision, identification delay and transmitting bits, they are no longer memoryless. Cluster Adaptive Memoryless Protocol (CAMP) proposed in this paper takes account of all requirements of a good collision protocol. The grouping procedure and tree construction adopted makes the algorithm to stand apart.Keywords
Anti Collision, RFID, Passive Tag Identification, Tree Based Algorithm.- Performance Evaluation Study of Intelligent Vehicular Ad Hoc Networks
Abstract Views :157 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Applications, B.S. Abdur Rahman Crescent Engineering College, Vandalur, Chennai-600048, Tamilnadu, IN
2 Department of Computer Applications, B.S. Abdur Rahman Crescent Engineering College, Vandalur, Chennai-600048, Tamilnadu, IN
1 Department of Computer Applications, B.S. Abdur Rahman Crescent Engineering College, Vandalur, Chennai-600048, Tamilnadu, IN
2 Department of Computer Applications, B.S. Abdur Rahman Crescent Engineering College, Vandalur, Chennai-600048, Tamilnadu, IN