A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Anitha, R.
- On Achromatic Coloring of Line Graph of Central Graph of Star Graph
Authors
1 Department of Mathematics, Bishop Ambrose College, Coimbatore, IN
Source
Wireless Communication, Vol 7, No 8 (2015), Pagination: 266-268Abstract
In this paper, we discuss the achromatic coloring and achromatic number of line graph of central graph of star graph, denoted by χa[L(C(K1,n))].Keywords
Central Graph, Line Graph, Achromatic Coloring, Achromatic Number.- A Nonblocking Token Ring Based Checkpointing Algorithm for Distributed Mobile Computing Systems
Authors
1 Deparment of Computer Science, Arignar Anna Government Arts College Attur, Salem Dt Tamil Nadu, IN
2 Department of MCA, K. S. Rangasamy College of Technology, Tiruchengode, Namakkal Dt, Tamil Nadu, IN
Source
Wireless Communication, Vol 1, No 2 (2009), Pagination: 116-120Abstract
Mobile computing introduces new flexibility such as continuous access to computing resources while the users travel.This facility raises new challenges such as fault tolerance in distributed mobile computing system. In this paper we present a non blocking token ring based checkpointing algorithm to tolerate the faults in the mobile computing environment. It is a single phase algorithm neither having the overhead of temporary checkpoints nor using dependency vector; and also it avoids the avalanche effect. Results shows that it outperforms two-phase algorithms.
Keywords
Checkpointing, Nonblocking, Token Ring.- An Approach to Detect Sybil Attack in VANET by Neighbor Processing Algorithm
Authors
1 Department of Computer Applications, S. A. Engineering College, IN
Source
Wireless Communication, Vol 11, No 4 (2019), Pagination: 70-73Abstract
In the recent years, researchers are focusing on the Vehicular Adhoc Network (VANET) field due to the lifesaving factor. VANET is one of the important application in the Mobile Adhoc Network (MANET).VANETs are defined as the set of the vehicles or the Road Side Unit(RSU) that communicate through the Wireless Local Area Network (WLAN) .VANET is an application of Intelligent Transportation System (ITS) that aims towards the safety and comfort of drivers and passengers . It is a network where vehicles communicate with each other to find the distance and finding the obstacles in the road. As it is a open network everyone can use it, so security and privacy is the major issue in the VANET. Especially in the authentication process, the vehicles needed to be authenticated before accessing or sending messages to the network. There are many attacks in the VANET application one of the major attack is the Sybil attack. Sybil attack is that attacker is creating multiple identities or making an illusion of the traffic congestion by the malicious nodes .This paper presents about the VANET overview, Sybil attack detection and proposes an approach neighborhood algorithm that is used to find the malicious nodes in Sybil attack.
Keywords
Vehicular Adhoc Networks, VANET Security, Sybil Attack, Timestamp Series.References
- Ubaidullah Rajput,Fizza Abbas,Ayaz Hussain,Dost Muhhamad Saqib Bhatti and M.SullemanMenon,”Privacy Preserving Authentication in VANET: Existing Challenges and Future Directions”, IJCNS International Journal of Computer Science and Network Security, vol .18 no.4,April 2018.
- Rasha Al-Mutri,Mznah Al-Rodhaan and Yaun tian,”Improving Vehicular Authentication in VANET using Cryptography”,International Journal of Communication Networks and Information Security, vol 10,no 1,April 2018.
- Reza Fotohi,Yaser Ebazadeh and Mohammed Seyyar Geshlag,”A New Approach for Improvement Secirity against DoS attacks in Vehicular Ad-hoc Network”, International Journal of Advanced Computer science and Application, vol 7,no.7,2016.
- Gulshan kumar,Rahul saha and mritunjay kumar rai and Tai-hoon kim” Multidimensional security provision for secure communication in vehicular Adhoc Networks using Hierarchical structure and end to end authentication”,IEEE Access September 7,2018.
- Aaditya jain and divya Sharma,”Approaches to reduce the impact of DoS and DDoS attacks in VANET”, International journal of computer science vol 4, no 4, april 2016.
- Soyoung park,Baber Aslam,Damla Turgut,Cliff c.Zou, “Defense against Sybil attack in vehicular adhoc network based on roadside unit support”,research gate paperId#900042.
- Pinky mittal and Deepti Ahlwat”Sybil node detection using neighbourhood information passing”international journal of computer science and mobile computing, vol.5 issuee 8, aug 2016.
- Tong Zhou,Romit Roy Choudary,peng ning,Krishnendu Chakrabarty, “Privacy preserving detection of Sybil attacks in vehicular adhoc networks” ,Fourth annual International conference on mobile and ubiquitous Systems :networking and services(MobiQuitous)1-8,2007.
- Naveet,Rakesh Ghill “sybil attack detection and prevention using ADOV in VANET”,International journal of computer science and management studies vol.no.2013.
- Mina Rhabari and Mohammad Ali “Efficient detection of Sybil attack based on cryptography in vanet”, International Jounal of Network Security and its applications (IJNSA),vol 3,no 6 ,nov 2011.
- Shivangi Nigam, Abhishek Bajpai,Neeraj Kumar, “Signal and Time based Fuzzy Cluster to detect Sybil attack in VANET”, International journal on computer science and engineering(IJCSE) vol.9,no 7 ,jul 2017.
- Jyoti Grover ,Manoj Singh Gaur,Vijay Laxmi, “A Sybil attack detection Approach using neighboring vehicles in VANET”,International conference on security of information and networks,2011.
- Sohail Abbas,Madjid Merabti,David Llewellyn Jones, “Signal strength based sybil attack detection in wireless adhoc networks”,International conference on eSystems Engineering,2009.
- S.Abbas ,merabti,Llewellyn-jones, kifayat “ Lightweight Sybil attack detection in manets” IEEE,System journal,vol 7,2013.
- Yamini D Malkhede, Purnima Selokar, “Sybil attack detection in mobile adhoc network”, International journal of computer science, vol 4 june 2015.
- A Survey on Mobile and Cloud Computing Security Issues and Challenges
Authors
1 Department of Computer Applications, S. A. Engineering College, IN
Source
Wireless Communication, Vol 12, No 2 (2020), Pagination: 21-24Abstract
GPRS is a relatively new technology that offers a packet based radio service with mobile network which is based on GSM circuit switching. To guarantee the QoS of voice service not being affected by the introduction of GPRS, preemptive priority is applied for voice calls to preempt GPRS data packet. Delivery of data packet from and to the mobile station within its service area. To provide packet mode transmission within the GSM network and interconnects with external packet data network. GPRS is used to wireless data communication. To improve your business performance and provide a successful business services. Limited cell capacity for all users. Lower access speed in reality. No support of GPRS Mobile Terminate Connection for a mobile server. The mobile computing is a wireless and wired data connection. Mobile computing invokes mobile hardware, mobile software and mobile communication. The communications are issues of adhoc network, protocol, infrastructure. The hardware are issues mobile devices and devices component. The software are requirements of mobile applications.