Notice Board :

Call for Paper
Vol. 13 Issue 2

Submission Start Date:
February 01, 2025

Acceptence Notification Start:
February 15, 2025

Submission End:
March 20, 2025

Final MenuScript Due:
March 25, 2025

Publication Date:
March 31, 2025
                         Notice Board: Call for PaperVol. 13 Issue 2      Submission Start Date: February 01, 2025      Acceptence Notification Start: February 15, 2025      Submission End: March 20, 2025      Final MenuScript Due: March 25, 2025      Publication Date: March 31, 2025




Volume VIII Issue II

Author Name
Aditi Dawane, Hemant Kumar Gupta
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 2
Abstract
A mobile ad hoc network (MANET) comprises of an assortment of wireless mobile nodes that frames a brief system without having any fixed foundation or unified organization. MANET is foundation less, need of concentrated checking and dynamic changing network topology. MANET is exceptionally powerless against attack because of open mistake inclined shared wireless medium. This paper contains the detection and prevention of wormhole attack for AODV routing protocols. Our observations regarding the behavior of the above protocol, in large-scale Mobile Ad hoc Networks (MANETs) and from the analysis it is clear that the trust-based algorithm to send data to the leader proof to offer more reduced drop packets and also increase the lifetime of the network. Based on the analysis of this simulation results, Trusted Ad-hoc on-demand distance vector (TAODV) protocol offer a better solution to quality of service usage in a MANET.
PaperID
8201

Author Name
Shweta Goswami, Prof. Amit Sariya
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 2
Abstract
Cognitive Radio Networks are a promising technology likely to be deployed in the very near future as a viable solution to the spectrum shortage problems faced by traditional wireless systems. Technological breakthroughs in the field of Software Defined Radios enabled the development of flexible cognitive radio transceivers capable users. While these primary users are allowed to access their licensed spectrum resources anytime and anywhere, within the contractual limits imposed by spectrum management authorities, cognitive radios have to scan and identify any unused spectrum in the licensed bands. Most importantly, in order not to interfere with primary users, they have to rapidly vacate of dynamically changing their transmission parameters in order to efficiently exploit the available wireless resources. This increased capability of cognitive radios to self adapt based on interactions with the surrounding environment makes them the perfect candidates for opportunistic spectrum access i
PaperID
8202

Publish your own book with us

with ISBN


for more details contact:
snspes@gmail.com