Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Chaba, Yogesh
- Performance Evaluation of Location Aided Routing in MANET
Abstract Views :141 |
PDF Views:1
Authors
Affiliations
1 Department of CSE, Guru Jambheshwar University of Science & Technology, Hisar, IN
1 Department of CSE, Guru Jambheshwar University of Science & Technology, Hisar, IN
Source
Wireless Communication, Vol 4, No 13 (2012), Pagination: 768-772Abstract
A mobile ad hoc network is a wireless network that uses multi hop peer to peer routing. A user can move any time at any place, as a result that network need to have routing protocol which can hold dynamically changing topology. To accomplish this, a number of ad hoc routing protocol have been proposed and implemented such as DSR, LAR, WRP. The comparatively study will be done on basis of increase in number of nodes with CBR values. Three simulation result are described using two CBR values these are 10 and 50. In these results LAR perform best as comparison of DSR and WRP because the LAR protocol uses location information to reduce the search space for a desired route limiting the search space-results in fewer route discovery messages. This paper compares the major characteristics of these protocols such as throughput, collision, loss packet percentage using a parallel discrete event-driven simulator, Glomosim-2.03. In light traffic load, throughput and collision of DSR protocol is best as compare to LAR and WRP but in heavy traffic LAR is best because in heavy traffic LAR use Global Positioning System to find the exact location of node in network. So that overhead has to be reduced.Keywords
Mobile Ad Hoc Networks, DSR, LAR, WRP.- Hybrid Approach for Detection and Prevention of Blackhole Attack in Mobile Adhoc Network
Abstract Views :151 |
PDF Views:5
Authors
Affiliations
1 NIMS University, Jaipur, IN
2 Department of CSE, GJ University of Science & Technology, Hisar, IN
1 NIMS University, Jaipur, IN
2 Department of CSE, GJ University of Science & Technology, Hisar, IN
Source
Wireless Communication, Vol 3, No 12 (2011), Pagination: 885-890Abstract
In this paper, blackhole attack in mobile adhoc networks have been investigated. Blackhole attack is the attack in which all traffic is redirected to a specific node, which may not forward any traffic to all other nodes. The test-bed is created and system is developed using AODV as a base routing protocol on the network simulator. Various network performance parameters i.e. throughput, packet delivery ratio, collisions etc. are analyzed before and after attack. There are two existing mechanisms: packet based prevention, request based prevention and one hybrid mechanism for preventing blackhole attack is proposed. On implementation of blackhole attack the performance of the network reduces, but after implementation of detection and prevention mechanisms the performance of MANETs improves significantly and results shows that proposed hybrid technique is better than existing techniques.Keywords
AODV, Blackhole, Hybrid Prevention, MANET, PBP and RBP.- Performance Analysis of Individual Pair-Wise Cluster Key Management Scheme for Wireless Sensor Network
Abstract Views :126 |
PDF Views:1
Authors
Affiliations
1 G.J. University of Science & Technology, Hisar, IN
1 G.J. University of Science & Technology, Hisar, IN
Source
Wireless Communication, Vol 3, No 3 (2011), Pagination: 193-197Abstract
Due to the wide range of applications, Wireless Sensor Network(WSN) have recently attracted a lot of interest in the research community.WSN consist of large number of low-power sensor nodes, with limited processing, communication and storage resources. Due to limited resources of WSNs, it is challenging to incorporate basic security functions, such as authentication, privacy, confidentiality, availability and integrity etc. In order to protect the sensitive data and the sensor reading, secret keys should be used to encrypt the exchanged messages between communicating nodes. Because of high energy consumption and increased code storage requirement is needed by asymmetric cryptography such as RSA or ECC. Key management is one of the oldest areas in WSN security solution. This paper is devoted to the research on security efficiency for wireless sensor networks. The proposed scheme of IPC(Inter Process Communication) key management is based on the generation and distribution of the individual key, pair-wise key and the cluster head broadcast key. IPC have simulated and shows the performance for energy consumption with increasing number of neighbors, and time taken in individual key establishment with the number of nodes in the network. The security analysis shows that the scheme within this paper meets the unique security needs of the sensor networks.Keywords
Attacks, Key Management, Security, Sensor Node, Wireless Sensor Network.- Performance Analysis and Comparison of Scheduling Algorithm in MANET’s
Abstract Views :160 |
PDF Views:5
Authors
Affiliations
1 Department of CSE, GJ University of Science & Technology, Hisar, IN
2 Department of CSE, GITM College Gurgaon (Haryana), IN
1 Department of CSE, GJ University of Science & Technology, Hisar, IN
2 Department of CSE, GITM College Gurgaon (Haryana), IN
Source
Networking and Communication Engineering, Vol 3, No 14 (2011), Pagination: 909-914Abstract
Ad-hoc network are flexible, self-configurable, easy and fast to deploy. There is a growing need to supports better than best-effort quality of services (QoS) in mobile ad-hoc networks. A lot of research has been done mainly in the area of routing and isolated Ad-hoc network. The QoS is very challenging and important in the multimedia and real time application environments. Therefore a QoS architecture for Ad-hoc network is necessary that can internetwork with infracture based QoS approach. In this research paper the performance analysis of the scheduling scheme that is mostly used in the MANET’s network is done. The comparison is based on the end-to-end delay, maximum throughputs and jitter (delay variance). It is found that DiffServ is the best scheduling technique as compare to WRR,WF and Strict priority technique.Keywords
MANET’s, QoS, Scheduling Technique, DiffServ, WRR, WF, SP.- Intrusion Detection System for Protection against Packet Dropping Attack on Distributed Information System in any Organization
Abstract Views :141 |
PDF Views:2
Authors
Affiliations
1 JNU, Jodhpur, IN
2 Department of CSE, GJ University of Science & Technology, Hisar, IN
3 JNU Jodhpur, IN
1 JNU, Jodhpur, IN
2 Department of CSE, GJ University of Science & Technology, Hisar, IN
3 JNU Jodhpur, IN
Source
Networking and Communication Engineering, Vol 3, No 7 (2011), Pagination: 510-513Abstract
Intrusion detection is the method in which the events happening in a computer system or network are monitored and analyzed for signs of possible incidents, which may be threats of violation of information security policies or standard security practices. Intrusion prevention system makes an attempt to stop detected possible incidents which are threat to security. Intrusion detection and prevention system (IDPS) primarily focuses on detection and prevention of possible incidents which are threat to information security. In this paper a defence against packet dropping attack on Distributed Information System is designed in the form of Intrusion Detection System. Two techniques are implemented for prevention against selfish node intrusion: Enabling Broadcasting (EB) and Selective Multicast Addressing (SMA). EB is a cost-effective intrusion detection and prevention solution to the packet dropping using broadcasting method. The SMA is a solution that limits the number of active addresses flowing i.e. selective multicasting or selective multicast addressing, for an access link in order to find out multiple path for destination node. Performance is evaluated for different parameters and it is found that the proposed system of intrusion detection gives much better performance.Keywords
Broadcasting, IDS, Intrusion, Information, Security.- Adaptive Local Route Optimization Technique with Multiple MAP Environments in Hierarchical Mobile IPv6 Networks
Abstract Views :170 |
PDF Views:2
Authors
Affiliations
1 Department of CSE, GJ University of Science & Technology, Hisar, IN
2 Department of CSE, Jyoti Vidhyapeeth Women Universty, Jaipur, IN
3 Om Institute of Technology & Management, Hisar, IN
1 Department of CSE, GJ University of Science & Technology, Hisar, IN
2 Department of CSE, Jyoti Vidhyapeeth Women Universty, Jaipur, IN
3 Om Institute of Technology & Management, Hisar, IN
Source
Networking and Communication Engineering, Vol 3, No 4 (2011), Pagination: 223-228Abstract
WiMax is an acronym meaning Worldwide Interoperability for Microwave Access (WiMax). WiMax based on Wireless Metropolitan Area Networking (WMAN) standards developed by the IEEE 802.16 group. The IEEE 802.16 standard was developed to deliver Non-Line-of-Sight (NLoS) connectivity between a subscriber station and base station with typical cell radius of three to ten kilometres. A frequently IP handover plays very important role to increase the performance of network in WiMax. HMIPv6 (Hierarchical Mobile IPv6) basically reduces the overhead of signalling overhead as well as latency of handoff which is associated with the MIPv6. ALRO(Adaptive Local Route Optimization) technique that implements within the single MAP(Mobility Anchor Point) environment optimizes the route at the SMR predefined threshold value. An enhanced version of ALRO technique implemented with Multiple MAP domain is proposed in this paper. It is found that ALRO scheme implemented in HMIPv6 protocol with the multiple MAP environment improves the network performance as compared to basic ALRO scheme.Keywords
ALRO, ALROMMAP, HMIPv6, MAP.- Impact of Varying Node Mobility on Performance of Mobile Ad hoc Networks
Abstract Views :156 |
PDF Views:3
Authors
Affiliations
1 Department of CSE, GJ University of Science & Technology, Hisar, IN
1 Department of CSE, GJ University of Science & Technology, Hisar, IN
Source
Networking and Communication Engineering, Vol 3, No 3 (2011), Pagination: 166-171Abstract
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any existing infrastructure. Two mobility models Random Waypoint and Group mobility are commonly used in MANET scenario. In this paper, the effects of various mobility models on the performance of three routing protocols Bellman Ford, Adhoc On Demand Distance Vector(AODV) and Zone Routing Protocol(ZRP) have been studied. For experiment purposes, two mobility scenarios: Random Waypoint, Group Mobility have been considered. These two Mobility Models are selected to represent possibility of practical application in future. Performance comparison has also been conducted across varying node mobility. Experiment results illustrate that performance of the routing protocol varies across different mobility models and mobility. Results show that the protocol performance may vary drastically across mobility models and performance rankings of protocols may vary with the mobility models used.Keywords
AODV, MANET, Routing, ZRP.- Analysis of Security Protocols in Wireless Sensor Network
Abstract Views :128 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science & Engineering, Guru Jambheshwar University of Science & Technology, Hisar (Haryana), IN
1 Department of Computer Science & Engineering, Guru Jambheshwar University of Science & Technology, Hisar (Haryana), IN
Source
International Journal of Advanced Networking and Applications, Vol 2, No 3 (2010), Pagination: 707-713Abstract
Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of real-world applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial machine monitoring, and surveillance systems. This paper discusses typical constraints, security goals, threat models and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods. The most critical area prone to attack is nearby the base station as the data is more aggregated, that should be kept secure using a number of defensive techniques as stated.Keywords
Attacks, Threats, Security, Sensor Nodes, Wireless Sensor Network.- Analysis of Reactive Routing Protocols for Mobile Ad-Hoc Networks
Abstract Views :127 |
PDF Views:0
Authors
Affiliations
1 Department of of CSE, GJ Univ of Sc. & Tech, Hisar, IN
2 Department of CSE, JIET, Jind, IN
3 Department of CSE, GJ Univ of Sc. & Tech, Hisar, IN
4 Department of CSE, BPS, Khanpur, IN
1 Department of of CSE, GJ Univ of Sc. & Tech, Hisar, IN
2 Department of CSE, JIET, Jind, IN
3 Department of CSE, GJ Univ of Sc. & Tech, Hisar, IN
4 Department of CSE, BPS, Khanpur, IN