Anonymous Ad Hoc Network Performance Degradation Analysis in the Presence of Selfish
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
Wireless Ad Hoc networks are characterized by dynamic change in topology, infrastructureless architecture and creation of a network on the fly. Being wireless and co-operative in nature Ad Hoc networks are more prone to security breaches compared to their wired counterparts in all layers of the network. Most security protocols do not address the anonymity issues which can be gathered by a passive eavesdropper who can gather node identity, node location and other network information. Another issue that will affect an Ad hoc network is the non co-operation of nodes which could be selfish or malicious. In this paper we investigate the performance degradation of a dynamic anonymous ad hoc network with various degrees of selfishness. The results obtained are compared with all nodes co- operating and with all selfish nodes eliminated in the network.
Authors and Affiliations
R. Kalpana , Dr. N. Rengarajan
Architecture for Mobile based Face Detection / Recognition
In this paper a novel description of Face Detection-Recognition architecture through mobile devices is presented. Since the face detection/recognition is of importance in real-life scenarios, such as for authentication a...
A Novel Biometric system for Person Recognition Using Palm vein Images
The palm vein is one of the most reliable physiological characteristics that can be used to distinguish between individuals. In recent years, it receives more attention from the researchers. In this paper, we present a n...
Using Association Rule Mining for Extracting Product Sales Patterns in Retail Store Transactions
Computers and software play an integral part in the working of businesses and organisations. An immense amount of data is generated with the use of software. These large datasets need to be analysed for useful informatio...
Dynamic Resource Allocation in Desktop Grids
Grid computing (or the use of computational grids) is the application of several computers to a single problem at the same time. In grid computing ,the computing becomes pervasive and individual users(or client applicati...
IMPROVING SECURITY IN INITIAL NETWORK ENTRY PROCESS OF IEEE 802.16
IEEE 802.16 basically designed to provide more security as compared to other wireless networks. It provides many security features to protect the information in the network as well as to protect the network from unauthor...