International Journals
Permanent URI for this collectionhttps://dspace.psgrkcw.com/handle/123456789/105
Browse
Item AN ANALYSIS OF MANET AND VANET ROUTING PROTOCOLS(International Journal for Science and Advance Research in Technology (IJSART), 2018-02-02) Nithya AMANET and VANET square measure the active analysis areas and plenty of routing protocols have been planned to be used in these areas. In MANET, nodes square measure connected through wireless channels in an exceedingly network and every node acts as a router and as a number. One among the situation of Manet is transport ad-hoc networks. For communication in VANET, efficient Routing Protocols square measure required. attributable to extremely dynamical configuration and frequent disconnection it's strenuous to style Associate in Nursing economical routing protocol for vehicles, there will be 2 sorts of VANET that square measure V2V(Vehicle to Vehicle) and V2RSU(Vehicle to Road aspect Unit). As a result of daily happening of accidents VANET is one of the affecting areas for the refinement of Intelligent Transportation System (ITS) that will insure passengers and road safety. The Intelligent Transport Systems provides info if there exists any emergency and tells regarding traffic density. The traffic and traffic density. The prevailing routing protocols for VANET aren't economical enough to satisfy all traffic situations. Worthy routing protocols square measure needed to initiate communication between vehicles in future for passengers and road safety. This paper shows literature survey associated with Reactive and Proactive Routing Protocols of MANET as AODV, DSDV, OLSR, and DSR. Analysis and characterization of those protocols is shown within the paper which helps in any improvement of existing routing protocolsItem ROUTING MISBEHAVIOR DETECTION IN MANET USING 2ACK(International Journal of Innovative Computer Science & Engineering (IJICSE), 2017-05) Nithya AData security and privacy protection with resource efficiency are the major challenging tasks of wireless Networks. Due to high mobility, untrusted nature is the major challenges faced in mobile networks. Packet dropping and modifications are also common attacks that can be launched by an adversary to disrupt communication in wireless networks. Many schemes have been proposed to mitigate, prevent and tolerate such attacks, but very few can efficiently identify the attackers. Even those schemes could find after the attacks done. Those type of schemes used packet marking techniques to investigate and verify the security issue. The type of implementation is not considered the communication and energy overhead. To address these issues, the proposed system introduces a simple yet effective scheme, which can identify misbehaving forwarders and routes that drop or modify packets. Networks, Encryption; security, Permutation. The proposed system also considers the other type of security issues, in order to identify and prevent the data from unauthorized forwarders, the system proposed a new protocol which is named as ACT (Anonymous Concealed data Transmission). The proposed system utilizes several techniques to protect, prevent and avoid routing misbehaving attacks. In order to identify and block the nodes which tries to drop or modify the data, the proposed system has been implemented the key bit verification algorithm. The procedure behind the proposed system is to identify the key and its value of every packet with concealed data transmission. The proposed system demonstrates that ACT can well protect user data against both inside and outside attackers.