• Nenhum resultado encontrado

[PDF] Top 20 A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network

Has 10000 "A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network " found on our website. Below are the top 20 most common "A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network ".

A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network

A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network

... watchdog/pathrater. In watchdog when a node forwards a packet, the node’s watchdog verifies that the next node in the path also forwards the packet by promiscuously listening to the next node’s ... See full document

20

A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

... drawback in the existing protocols in dealing with energy management issues is that the time varying nature of the wireless channels among the ad hoc nodes is ...energy efficient Medium ... See full document

7

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

... Stability and Energy Aware Ad hoc On- demand Multipath routing Protocol (LSEA) is proposed, which adapts a delay function, link quality and battery remaining ...Minimum and ... See full document

5

Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network

Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network

... security in a mobile ad hoc network because of its open nature, dynamically changing topology, lack of infrastructure and central ...attack, in which a malicious node ... See full document

13

Implementing Smart Antenna System in Mobile Ad Hoc  Networks

Implementing Smart Antenna System in Mobile Ad Hoc Networks

... data and are at some distance ...nodes in forwarding its data packets to Node B. In other words, the data packets from Node A are passed onto the neighbouring nodes in a series of single hops ... See full document

6

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

... nodes in the Ad hoc networks are independent and well ...creature in the world visible to the eye is ...intricate and communicative ...path and moving in a queue ... See full document

6

Routing Based Data Security in Mobile Ad Hoc Network Using Group Key Management

Routing Based Data Security in Mobile Ad Hoc Network Using Group Key Management

... A mobile ad-hoc network (MANET) is a self-organizing system of mobile devices followed an infrastructure less framework associated by wireless ...links. In MANET, there is a ... See full document

7

A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

... Generally in reactive protocols[1], when a source node ‘S’ has to communicate with destination node ‘D’, it initiates path discovery by broadcasting a route request packet RREQ to its ...uniquely. In the ... See full document

14

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

... QoS routing in Mobile Ad-Hoc networks, the challenges we met, and the approach we ...discussed in detail our idea of adding support for QoS into the AODV ...simulation ... See full document

7

A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

... the network very ...But, in our scenario the malicious node changes the intended destination by sending a wrongly assigned beacon packet to the target ...MDE algorithm in MIST can completely ... See full document

13

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

... Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile ...the ... See full document

6

Study of Impact of Mobile Ad hoc Networking and its Future Applications

Study of Impact of Mobile Ad hoc Networking and its Future Applications

... way in which research activity has been going on, in both academia and industry, on wireless mobile ad hoc networks, is a representation of their tremendous potential now being ... See full document

6

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

... simple and direct approach to broadcast a message from one node to another node in the ...well-known ad hoc routing protocols of MANET use flooding to ensure that all nodes receive the ... See full document

11

Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks

Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks

... The Ad hoc On Demand Distance Vector (AODV) routing algorithm is a routing protocol designed for ad hoc mobile networks [6] ...unicast and multicast ... See full document

9

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

... An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic ...(ERPN). In this paper, the proposed protocol enhances Dynamic Source ... See full document

6

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

... An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic ...(ERPN). In this paper, the proposed protocol enhances Dynamic Source ... See full document

6

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

... proactive routing protocol based on the classical distributed Bellman-Ford routing algorithm ...[2]. In DSDV[4] messages are shared between the mobile nodes ...are in the same ... See full document

6

Proposed protocol for secured multi path routing in ad hoc networks

Proposed protocol for secured multi path routing in ad hoc networks

... common mobile network usually appears in forms, such as the cellular network or the wireless local area ...cellular network, communication of portable terminal must finish with the aid ... See full document

6

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

... K-means algorithm to improve the routing process in Mobile Ad-Hoc networks (MANETs) is ...presented. Mobile ad-hoc networks are a collocation of ... See full document

14

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

... relays in which each forward node determine the status of it neighbors based on its partial 2-hop information through node ...delay and back-off delay (Wu and Dai, ...broadcasting in ad ... See full document

6

Show all 10000 documents...