Mobility

Counter Hacking Mechanism in Clustered Routing to Provide Quality of Service in Mobile Ad Hoc Networks

Download Now Free registration required

Executive Summary

In ad hoc networks, each node is connected instantaneously, wireless without a central control. Its challenge lies with dynamic topology and limited battery energy. Its instant infrastructure poses a greater dispute in routing. Since the medium is wireless and no central control, there are lots of chances of attack by intruders. The impact of hackers attack and the process to overcome from those attacks have been discussed. The consequence made by the hackers is analyzed in terms of packet loss, throughput and delay. At the same time, the performance is also measured after overcoming from the attack process. The analysis and performance are done using ns2 tool.

  • Format: PDF
  • Size: 415.59 KB