PERFORMANCE ENHANCEMENT AND INTEGRATING SECURITY IN AD-HOC NETWORK BASED DATA TRANSMISSION
Keywords:
PERFORMANCE, INTEGRATING, AD-HOC NETWORKAbstract
-Ad hoc networks has been considered as wireless networking paradigm for mobile hosts for particular purpose only. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. In this paper we have done in order to improve quality in we have to speed up packet transmission providing them better security to network of mobile. Here we have study to during packet transmission pre-processing time, post processing time & transmission speed must be considered. We have study to improve transmission speed & using replacement policy to reduce packet size during communication & cooperative
driving among nearly ad hoc & between mobile. We have done avoid resending of same data again by buffering packet in temporary database.
References
Ahmed M. Al Naamany “Wireless LAN Security Overview” in 2006
Aaditya Jain, “Advance Trends in Network Security within Honey pot & its Comparative Study within other Techniques” ,December 2015
C. Sanchez-Avila analyzed structure & design International Journal of Engineering Science & Technology Vol. 8 No 2007
Dr. Mazin Sameer Al-Hakeem, " Development of Fast Reliable Secure File Transfer Protocol ", Journal of Zhejiang University-SCIENCE , 2013
Jason V. Chang,” computer hacking making”, Journal of Zhejiang UniversitySCIENCE, 2012 6. Lidong Zhou Ali Jalooli, Rafidah
MdNoor,Rashid Hafeez Khokhar, Jaime Lloret, " Securing AD-HOC Networks", Wireless Networks , Springer ,2015
Lian, S., Liu, Z., Ren, Z., Wang, H.: “Secure advanced video coding based on selective encryption algorithms”. IEEE Trans.
Consume. Electron. 2006
Lian, S., Liu, Z., Ren, Z., Wang, H.: “Commutative encryption & watermarking in video compression” IEEE Trans. Circuits
Syst. Video Technol.2007
Neetu Settia “security & attack aspects of cryptographic techniques Current Activity & Future Directions “ Acm Sigcomm
Computer Communication Review, 28(3):5– 26, July 2008
Punita Meelu “ fundamental mathematics behind AES algorithm” in 2009
Susan Darshan Lal “Destruction Security field is a new & fast moving career” International Journal of Advance Research
in Computer Science & Management Studies on 2008
Scott Wolchok , Attacking Washington, D.C.Internet Voting System ,2010
Sumedha Kaushik, Ankur Singhal “Network
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.