International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 127    Submit Your Rating     Cite This   Download        Certificate

FRAMEWORK OF SECURE WIRELESS NETWORK

    1 Author(s):  KHUSHBU KALRA

Vol -  6, Issue- 4 ,         Page(s) : 119 - 123  (2015 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Ad-hoc network is a basically a collection of multiple mobile nodes which are capable of forming dynamically a temporary network without any centralized fixed infrastructure’s support. Data exchange take place in between these mobile nodes of the network. Hence, all participating nodes in data transmission should be co-operative nodes to ensure that the data transmission process does not fail. Data transmission process fails due to many different types of attacks which can take place at any intermediate node and convert it into malicious node.

  1. Zhang,Y; and Lee, W.(2000). Intrusion Detection in wireless Ad hoc networks.Proceedings of the 6th Annual International Conference on mobile computing and networking, 275-283).      
  2. K. Kuladinith, A. S. Timm-Giel, and C. Görg, “Mobile ad-hoc communications
  3. in AEC industry,” J. Inf. Technol. Const., vol. 9, pp. 313–323, 2004.
  4. G.jayakumar and G. Gopinath, “ModerAd hoc mobile wireless networks routing protocol—A review,” J.comput. Sci, , vol. 3,no. 8, pp.574-582, 2007.
  5. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in proc. 6th Annu.int. conf. Mobile Comput. Netw., Boston, MA,2000, pp. 255-265.
  6. B.Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. dissertation, Texas A&M Univ., College Station, TX,2004.
  7. A. Tabesh and L.G.Frechette,”A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator,” IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 840-849, Mar.2010.
  8. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgement-based approach for the detection of routing misbehavior in MANETs.” . IEEE Trans. Mobile Comput.,vol. 6, no. 4, pp. 536-550, May 2007.
  9. T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video
  10. transmission enhancement in presence of misbehaving nodes in MANETs,”
  11. Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.
  12. R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network
  13. Security,” in Lecture Notes in Electrical Engineering, vol. 127.New York: Springer-Verlag, 2012, pp. 659–666.
  14. IEEE Transactions on industrial electronic, VOL. 60, NO. 3, MARCH 2013
  15. J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection
  16. and response for mobile ad hoc networks,” in Proc. IEEE Int. Conf.
  17. Perform., Comput., Commun., 2004, pp. 747–752.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details