Notice Board :

Call for Paper
Vol. 8 Issue 4

Submission Start Date:
Aug 15, 2020

Acceptence Notification Start:
Sep 10, 2020

Submission End:
Sep 20, 2020

Final MenuScript Due:
Sep 30, 2020

Publication Date:
Oct 05, 2020
                         Notice Board: Call for PaperVol. 8 Issue 4      Submission Start Date: Aug 15, 2020      Acceptence Notification Start: Sep 10, 2020      Submission End: Sep 20, 2020      Final MenuScript Due: Sep 30, 2020      Publication Date: Oct 05, 2020




Volume VIII Issue II

Author Name
Aditi Dawane, Hemant Kumar Gupta
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 2
Abstract
A mobile ad hoc network (MANET) comprises of an assortment of wireless mobile nodes that frames a brief system without having any fixed foundation or unified organization. MANET is foundation less, need of concentrated checking and dynamic changing network topology. MANET is exceptionally powerless against attack because of open mistake inclined shared wireless medium. This paper contains the detection and prevention of wormhole attack for AODV routing protocols. Our observations regarding the behavior of the above protocol, in large-scale Mobile Ad hoc Networks (MANETs) and from the analysis it is clear that the trust-based algorithm to send data to the leader proof to offer more reduced drop packets and also increase the lifetime of the network. Based on the analysis of this simulation results, Trusted Ad-hoc on-demand distance vector (TAODV) protocol offer a better solution to quality of service usage in a MANET.
PaperID
8201

Author Name
Shweta Goswami, Prof. Amit Sariya
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 2
Abstract
Cognitive Radio Networks are a promising technology likely to be deployed in the very near future as a viable solution to the spectrum shortage problems faced by traditional wireless systems. Technological breakthroughs in the field of Software Defined Radios enabled the development of flexible cognitive radio transceivers capable users. While these primary users are allowed to access their licensed spectrum resources anytime and anywhere, within the contractual limits imposed by spectrum management authorities, cognitive radios have to scan and identify any unused spectrum in the licensed bands. Most importantly, in order not to interfere with primary users, they have to rapidly vacate of dynamically changing their transmission parameters in order to efficiently exploit the available wireless resources. This increased capability of cognitive radios to self adapt based on interactions with the surrounding environment makes them the perfect candidates for opportunistic spectrum access i
PaperID
8202

Publish your own book with us

with ISBN


for more details contact:
snspes@gmail.com