PEC University of Technology

Displaying 1-9 of 9 results

  • White Papers // Jun 2012

    Border-Node Based Movement Aware Routing Protocol

    In this paper, the authors exploit the position based routing for VANET. They take the benefit of BMFR protocol to reduce the number of hops. Further, they take advantage of AMAR for optimizing the path with the help of speed and direction in addition to position of neighbours. Finally, to...

    Provided By PEC University of Technology

  • White Papers // May 2012

    An Approach to Detect the Wormhole Attack in Vehicular Adhoc Networks

    In VANET there is no centralised infrastructure due to which it is vulnerable to various security attacks. One of such attack is wormhole attack, it enables an attacker to capture packets at one location and tunnels them to another location making a wormhole in-between the legitimate nodes of the network....

    Provided By PEC University of Technology

  • White Papers // Jul 2011

    Deployment and Evaluation of IEEE 802.11 Based Wireless Mesh Networks in Campus Environments

    The traditional wireless networks cannot handle new requirements posed on the system. To become independent of backbone networks leading to cheap deployments, the traditional single-hop approach needs to be replaced by its multi-hop counterpart called Wireless Mesh Networks (WMNs). The authors can be considered as hybrid between wireless infrastructure (WLAN)...

    Provided By PEC University of Technology

  • White Papers // Mar 2011

    Enhanced Security Protocol in Wireless Sensor Networks

    The need for security in communications is in fact not new. This need has existed in military communications for thousands of years. In this paper, the authors focus on network protocols that provide security services. Wireless sensor network is an emerging technology that shows applications both for public as well...

    Provided By PEC University of Technology

  • White Papers // Nov 2010

    EECDA: Energy Efficient Clustering and Data Aggregation Protocol for Heterogeneous Wireless Sensor Networks

    In recent years, energy efficiency and data gathering is a major concern in many applications of Wireless Sensor Networks (WSNs). One of the important issues in WSNs is how to save the energy consumption for prolonging the network lifetime. For this purpose, many novel innovative techniques are required to improve...

    Provided By PEC University of Technology

  • White Papers // Aug 2010

    Security Information Hiding in Data Mining on the Bases of Privacy Preserving Technique

    Data mining has attracted a great deal of information industry and in society as a whole in recent years, due to the wide availability of huge amount of data and the imminent need for such data into useful information and knowledge. The information and knowledge gained can be used for...

    Provided By PEC University of Technology

  • White Papers // Apr 2010

    Threshold Based Authorization Model for Authentication of a Node in Wireless Mesh Networks

    As various wireless networks evolve into the next generation to provide better services, a key technology, Wireless Mesh Networks (WMNs), has emerged recently. There are number of issues in the deployment of WMNs. Amongst others security is quite a serious issue. Authenticating the users and devices in the network is...

    Provided By PEC University of Technology

  • White Papers // Mar 2010

    Comparative Analysis of Various Automated Test Tools for Flex Application

    This paper is aimed to carry a comparison study of automated testing frameworks for Rich Internet Applications (RIA) made using Flex framework. Test cases will be written in different languages like Ruby, ActionScript, etc., using identified frameworks on a reference application. Frameworks (FunFX and FlexMonkey) are evaluated on the basis...

    Provided By PEC University of Technology

  • White Papers // Dec 2009

    Attacks and Their Counter Measures in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. However, many technical issues still exist in this field. In order to provide a better understanding of the research...

    Provided By PEC University of Technology

  • White Papers // Aug 2010

    Security Information Hiding in Data Mining on the Bases of Privacy Preserving Technique

    Data mining has attracted a great deal of information industry and in society as a whole in recent years, due to the wide availability of huge amount of data and the imminent need for such data into useful information and knowledge. The information and knowledge gained can be used for...

    Provided By PEC University of Technology

  • White Papers // Apr 2010

    Threshold Based Authorization Model for Authentication of a Node in Wireless Mesh Networks

    As various wireless networks evolve into the next generation to provide better services, a key technology, Wireless Mesh Networks (WMNs), has emerged recently. There are number of issues in the deployment of WMNs. Amongst others security is quite a serious issue. Authenticating the users and devices in the network is...

    Provided By PEC University of Technology

  • White Papers // Dec 2009

    Attacks and Their Counter Measures in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. However, many technical issues still exist in this field. In order to provide a better understanding of the research...

    Provided By PEC University of Technology

  • White Papers // Mar 2010

    Comparative Analysis of Various Automated Test Tools for Flex Application

    This paper is aimed to carry a comparison study of automated testing frameworks for Rich Internet Applications (RIA) made using Flex framework. Test cases will be written in different languages like Ruby, ActionScript, etc., using identified frameworks on a reference application. Frameworks (FunFX and FlexMonkey) are evaluated on the basis...

    Provided By PEC University of Technology

  • White Papers // Nov 2010

    EECDA: Energy Efficient Clustering and Data Aggregation Protocol for Heterogeneous Wireless Sensor Networks

    In recent years, energy efficiency and data gathering is a major concern in many applications of Wireless Sensor Networks (WSNs). One of the important issues in WSNs is how to save the energy consumption for prolonging the network lifetime. For this purpose, many novel innovative techniques are required to improve...

    Provided By PEC University of Technology

  • White Papers // Mar 2011

    Enhanced Security Protocol in Wireless Sensor Networks

    The need for security in communications is in fact not new. This need has existed in military communications for thousands of years. In this paper, the authors focus on network protocols that provide security services. Wireless sensor network is an emerging technology that shows applications both for public as well...

    Provided By PEC University of Technology

  • White Papers // Jul 2011

    Deployment and Evaluation of IEEE 802.11 Based Wireless Mesh Networks in Campus Environments

    The traditional wireless networks cannot handle new requirements posed on the system. To become independent of backbone networks leading to cheap deployments, the traditional single-hop approach needs to be replaced by its multi-hop counterpart called Wireless Mesh Networks (WMNs). The authors can be considered as hybrid between wireless infrastructure (WLAN)...

    Provided By PEC University of Technology

  • White Papers // Jun 2012

    Border-Node Based Movement Aware Routing Protocol

    In this paper, the authors exploit the position based routing for VANET. They take the benefit of BMFR protocol to reduce the number of hops. Further, they take advantage of AMAR for optimizing the path with the help of speed and direction in addition to position of neighbours. Finally, to...

    Provided By PEC University of Technology

  • White Papers // May 2012

    An Approach to Detect the Wormhole Attack in Vehicular Adhoc Networks

    In VANET there is no centralised infrastructure due to which it is vulnerable to various security attacks. One of such attack is wormhole attack, it enables an attacker to capture packets at one location and tunnels them to another location making a wormhole in-between the legitimate nodes of the network....

    Provided By PEC University of Technology