- Filter by:
-
Content Type
-
Topic
-
Traffic Succession Capacity Province Outflow for Attached Content Distribution Networks
Multimedia streaming applications and services unit of measurement turning into trendy in recent a year, that's why issue of trustworthy video delivery to forestall the undesirable content outflow becomes necessary. The quality systems self-addressed this issue by proposing ways that during which supported observation of streamed traffic throughout the network....
Download Now -
Effective Cloud Services Using Mutual Trust Access Control Mechanism (MTACM)
In the cloud environment, the trust management is a major component for providing virtualized and scalable web services from the service providers to the various cloud users. Many existing systems are not proficient in providing trusted cloud services. The trust can be defined as an act of faith, belief and...
Download Now -
VANET Application in Routing Protocol
VANET or Vehicular Ad hoc Network can be defined as a network technology that is used among vehicles to communicate with each other and with nearest fixed equipment. Routing protocols are used in VANETs to discover the route and store the data in the table. Vehicular Ad Hoc Networks (VANETs)...
Download Now -
An Energy Efficient Hybrid Routing for Wireless Sensor Network Using Fuzzy Logic
Wireless sensor networks are a collection of sensor nodes and base station. The nodes have limited battery power. The efficient utilization of sensor node's energy, clustering is one of the powerful tool. The heterogeneous wireless sensor networks consist of different type of sensor nodes in term of sensing, computation, communication...
Download Now -
A Survey on Existing Network Security Protocols
Network plays a vital role in communication technology. A network is a connection of nodes or entities that provides a communication path. Once the network is established securing network is also a major concern. Many security protocols have been developed and used to protect network from attacks. But yet securing...
Download Now -
A Novel Syn Flood Detection Mechanism for Wireless Network
SYN flood attack is a Distributed Denial of Service attack (DDoS). This paper presents an effective and more accurate mechanism to detect synflood attack. In the proposed SYN-flood defense mechanism, different transport layer parameters are used to characterize attack, like abnormal increase in SYN packet, SYN-ACK packets and increase in...
Download Now -
Secure Routing in Mobile Ad-hoc Networks Using Evidence Theory
In Mobile Ad-hoc NETworks (MANETs) nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The open medium and wide distribution of nodes or the lack of centralized infrastructure make MANET vulnerable to malicious attackers. Security...
Download Now -
Energy Aware Healing in Sensors with Clutter Adaptability
Wireless sensor network encompasses wide variety of applications. But it is most likely to have failure in communication due to the destruction of sensor nodes by sudden deployment from the aero plane or battery exhaustion. This of data forwarding by the ineffective nodes creates holes in the network. For maintaining...
Download Now -
Duty-Cycle-Aware Minimum Latency Broadcast Scheduling in Clustered Multi-Hop Wireless Networks
Broadcast is an essential and widely-used operation in multi-hop wireless networks. Minimum Latency Broadcast Scheduling (MLBS) aims to provide a collision-free scheduling for broadcast in multi hop network. Previous paper mostly assumes that nodes are always active and thus are not suitable for duty-cycle-aware scenarios. Here investigate the Duty-Cycle-Aware Minimum...
Download Now -
Trust Assurance Mechanism against Gray Hole Attack in Mobile Ad Hoc Networks
Gray hole and black hole attacks are the major routing attacks in MANET (Mobile Ad hoc NETwork). In Gray whole attack the packets are dropped selectively by the attacker node after correctly participating in the route discovery phase. In this paper, a trust algorithm based on uncertain reasoning is used...
Download Now