A Review of Malicious Attack in Mobile Ad-Hoc Network Based On Power Constraints
Journal Title: Indian Journal of Computer Science and Engineering - Year 2016, Vol 7, Issue 3
Abstract
The minimization of power in wireless sensor network is big issue. If the process of energy constraints is optimized increase the reliability and security of mobile ADHOC network. The management of ADHOC network is great challenge due to dynamic infrastructure and mobility of node. Due to mobility of node routing path of network and security of communication suffered. In the process of node mobility and path discovery of routing protocol take huge amount of power and decrease the life of network. For the improvement of power and secured communication various protocol are designed but all are limitation in terms of group communication in ADHOC network. A security constraint in mobile ADHOC network is very critical task. Some critical security issue such as black hole attack, wormhole attack, sinkhole attack, prevention and detection of attack is major challenge. For the detection of wormhole attack various authors used various technique such as clock synchronization, threshold based technique, nearest neighbor node selection method.
Authors and Affiliations
Sanjay Yadav , Kaptan Singh
Multilevel Association Rules in Data Mining
Data is the basic building block of any organization. Be it an individual or an organization of any type, it is surrounded by huge flow of quantitative or qualitative data. Data are the patterns which are used to develop...
Collaborative Framework with User Personalization for Efficient web Search : A D3 Mining approach
User personalization becomes more important task for web search engines. We develop a unified model to provide user personalization for efficient web search. We collect implicit feedback from the users by tracking their...
Congestion in Wireless Sensor Networks and Mechanisms for Controling Congestion
The unique characteristics of WSN such as coherent nature of traffic to base station that occurs through its many-to-one topology and collision in physical channel are main reasons of congestion in wireless sensor networ...
Comparative Analysis of Pattern Recognition Methods: An Overview
The identification or interpretation of the pattern in an image can be described effectively with the help of Pattern Recognition (PR). It aims to extract information about the image to classify its contents. Inputs are...
COMPUTER SIMULATION OF BLOOD FLOW IN ARTERIES AFFECTED BY MULTIPLE ANEURYSM
The aim of this study is a numerical simulation of hemodynamics in blood vessels with multiple fusiform aneurysms. Dilation of 0.25 is considered. Using computational fluid dynamics, hemodynamic factors such as velocity...