ESAC Based Channel Aware Routing Using Route Handoff
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
An ad hoc network is a collection of mobile stations forming a temporary network without the aid of any centralized coordinator. Internal threats due to changes in the node behavior that target the routing discovery or maintenance phase of the routing protocol (CA-AOMDV) which applies a preemptive handoff strategy to maintain reliable connections by exploiting channel state information. Using the same information, paths can be reused when they become available again, rather than being discarded. And security challenges can however lead to insecure communication in MANETS. We proposed a model that found the improper behavior of the nodes and eliminated them. Also it provided secure routing mechanism of sharing messages between source and destination by adding information about sender and preserves the message content by computing hash function which prevents not only known attacks but also maintains the integrity of data. The reason we chose ESAC was because it typically enabled very high coding efficiency and provided better security.
Authors and Affiliations
Dr. V. kavitha , S. Balaji,
Randomized algorithm approach for solving PCP
Post Correspondence Problem is an undecidable problem that was introduced by Emil Post and is often used in proofs of undecidability. No efficient nondeterministic solution to the problem exists. The paper intends to pre...
Study on Identification of Harmonic Contributions Between Utility and Customer
Harmonic contributions can be decreased in Power System transmission and Distribution by planning the voltage harmonic levels in the acceptable limits so that Harmonic pollution can be limited to some extent. In this res...
A Simple Procedure for Extracting Quadratics from a Given Algebraic Polynomial
Any linear time-invariant continuous or discrete system can be represented either in the terms of characteristic algebraic polynomial or in the form of open-loop transfer function. The open-loop transfer function will co...
A Study of Image Segmentation and Edge Detection Techniques
Image segmentation is the key behind image understanding. Image segmentation is one of the most important steps leading to the analysis of processed image data. It is the prime area of research in computer vision. A numb...
Compact Dual Polarization Lidar System description and data processing
This paper describes the constructional features of a compact dual polarization lidar (CDPL) system developed for remote sensing the suspended particulate matter and clouds in the atmosphere. The new lidar system employs...