Open Access Open Access  Restricted Access Subscription Access

A Review of PQ Model for Infrastructureless Network

K. Thamizhmaran

Abstract


Wireless based dipole networks increased in security-basic applications, in view of their inborn asset obliged qualities, they are inclined to different security assaults, and a Dark opening assault is a sort of assault that genuinely influences information assortment. To overcome that test, a functioning recognition based security and trust steering plan named Dynamic Trust is proposed for WSNs. Route security in priority queuing in scheduling algorithm using NS2 Simulator. In this work, perform of priority queuing algorithm is evaluated to attain quality of Service (QoS).


Full Text:

PDF

References


Thamizhmaran, K. (2012). Authentication and Intrusion Detection in MANET. International Journal of Advance Research in Technology, 3(3), 15-21.1

Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2012). EAACK—a secure intrusion-detection system for MANETs. IEEE Transactions on industrial electronics, 60(3), 1089-1098.

Prabu, K., & Subramani, A. (2014). Energy efficient routing in MANET through edge node selection using ESPR algorithm. International Journal of Mobile Network Design and Innovation, 5(3), 166-175.

Hespanha, J. P., Naghshtabrizi, P., & Xu, Y. (2007). A survey of recent results in networked control systems. Proceedings of the IEEE, 95(1), 138-162.

Natsheh, E., Khatun, S., Jantan, A. B., & Shamala, S. (2008). Fuzzy metric approach for route lifetime determination in wireless ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput., 3(1), 1-9.

Thamizhmaran, K., Mahto, R. S. K., & Tripathi, V. S. K. (2012). Performance analysis of secure routing protocols in MANET. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 651-654.

Rajkumar, M. (2013). Efficient Data Prediction Scheme using SVM Classification. International Conference on Computer Science and Information Technology.

Arivazhagan, A., Thamizhmaran, K., & Thamilselvi, N. (2015). Performance Comparison of on Demand Routing Protocols under Back whole For MANET. Advance Research in Computer science and software Engineering, 5(3), 407-411.

Prabu, K., & Thamizhmaran, K. (2016). Cluster Head Selection Techniques and Algorithm for Mobile Ad-hoc Networks (MANETS). Advance Research in Computer science and software Engg, 6(7), 169-173.

Thamizhmaran, K. (2016). Performance Evaluation of EA3ACK in different topologies Using EAACK for MANET. i-Manager's Journal on Information Technology, 5(4), 5.


Refbacks

  • There are currently no refbacks.