Notice Board :

Call for Paper
Vol. 9 Issue 1

Submission Start Date:
Jan 15, 2021

Acceptence Notification Start:
Feb 10, 2021

Submission End:
Feb 20, 2021

Final MenuScript Due:
Feb 28, 2021

Publication Date:
March 05, 2021
                         Notice Board: Call for PaperVol. 9 Issue 1      Submission Start Date: Jan 15, 2021      Acceptence Notification Start: Feb 10, 2021      Submission End: Feb 20, 2021      Final MenuScript Due: Feb 28, 2021      Publication Date: March 05, 2021




Volume VIII Issue II

Author Name
Aditi Dawane, Hemant Kumar Gupta
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 2
Abstract
A mobile ad hoc network (MANET) comprises of an assortment of wireless mobile nodes that frames a brief system without having any fixed foundation or unified organization. MANET is foundation less, need of concentrated checking and dynamic changing network topology. MANET is exceptionally powerless against attack because of open mistake inclined shared wireless medium. This paper contains the detection and prevention of wormhole attack for AODV routing protocols. Our observations regarding the behavior of the above protocol, in large-scale Mobile Ad hoc Networks (MANETs) and from the analysis it is clear that the trust-based algorithm to send data to the leader proof to offer more reduced drop packets and also increase the lifetime of the network. Based on the analysis of this simulation results, Trusted Ad-hoc on-demand distance vector (TAODV) protocol offer a better solution to quality of service usage in a MANET.
PaperID
8201

Author Name
Shweta Goswami, Prof. Amit Sariya
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 2
Abstract
Cognitive Radio Networks are a promising technology likely to be deployed in the very near future as a viable solution to the spectrum shortage problems faced by traditional wireless systems. Technological breakthroughs in the field of Software Defined Radios enabled the development of flexible cognitive radio transceivers capable users. While these primary users are allowed to access their licensed spectrum resources anytime and anywhere, within the contractual limits imposed by spectrum management authorities, cognitive radios have to scan and identify any unused spectrum in the licensed bands. Most importantly, in order not to interfere with primary users, they have to rapidly vacate of dynamically changing their transmission parameters in order to efficiently exploit the available wireless resources. This increased capability of cognitive radios to self adapt based on interactions with the surrounding environment makes them the perfect candidates for opportunistic spectrum access i
PaperID
8202

Publish your own book with us

with ISBN


for more details contact:
snspes@gmail.com