PERFORMANCE ENHANCEMENT AND INTEGRATING SECURITY IN AD-HOC NETWORK BASED DATA TRANSMISSION

Authors

  • Ritu Malik Research Scholar, Department of CSA, CRSU Jind
  • Esha Bansal A.P. Department of CSA, CRSU Jind

Keywords:

PERFORMANCE, INTEGRATING, AD-HOC NETWORK

Abstract

-Ad hoc networks has been considered as wireless networking paradigm for mobile hosts for particular purpose only. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. In this paper we have done in order to improve quality in we have to speed up packet transmission providing them better security to network of mobile. Here we have study to during packet transmission pre-processing time, post processing time & transmission speed must be considered. We have study to improve transmission speed & using replacement policy to reduce packet size during communication & cooperative
driving among nearly ad hoc & between mobile. We have done avoid resending of same data again by buffering packet in temporary database.

References

Ahmed M. Al Naamany “Wireless LAN Security Overview” in 2006

Aaditya Jain, “Advance Trends in Network Security within Honey pot & its Comparative Study within other Techniques” ,December 2015

C. Sanchez-Avila analyzed structure & design International Journal of Engineering Science & Technology Vol. 8 No 2007

Dr. Mazin Sameer Al-Hakeem, " Development of Fast Reliable Secure File Transfer Protocol ", Journal of Zhejiang University-SCIENCE , 2013

Jason V. Chang,” computer hacking making”, Journal of Zhejiang UniversitySCIENCE, 2012 6. Lidong Zhou Ali Jalooli, Rafidah

MdNoor,Rashid Hafeez Khokhar, Jaime Lloret, " Securing AD-HOC Networks", Wireless Networks , Springer ,2015

Lian, S., Liu, Z., Ren, Z., Wang, H.: “Secure advanced video coding based on selective encryption algorithms”. IEEE Trans.

Consume. Electron. 2006

Lian, S., Liu, Z., Ren, Z., Wang, H.: “Commutative encryption & watermarking in video compression” IEEE Trans. Circuits

Syst. Video Technol.2007

Neetu Settia “security & attack aspects of cryptographic techniques Current Activity & Future Directions “ Acm Sigcomm

Computer Communication Review, 28(3):5– 26, July 2008

Punita Meelu “ fundamental mathematics behind AES algorithm” in 2009

Susan Darshan Lal “Destruction Security field is a new & fast moving career” International Journal of Advance Research

in Computer Science & Management Studies on 2008

Scott Wolchok , Attacking Washington, D.C.Internet Voting System ,2010

Sumedha Kaushik, Ankur Singhal “Network

Downloads

Published

2018-03-31

How to Cite

Malik, R., & Bansal, E. (2018). PERFORMANCE ENHANCEMENT AND INTEGRATING SECURITY IN AD-HOC NETWORK BASED DATA TRANSMISSION . Innovative Research Thoughts, 4(3), 86–96. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/543