Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Umarani, R.
- Internet Connectivity in Mobile Ad Hoc Network Using MPRAODV Routing Protocol
Abstract Views :166 |
PDF Views:4
Authors
M. Geetha
1,
R. Umarani
2
Affiliations
1 Department of Computer Applications, Vivekananda College of Arts and Sciences for Women, Triuchengode, IN
2 Department of Computer Science, Sri Sarada College for Women, Salem, IN
1 Department of Computer Applications, Vivekananda College of Arts and Sciences for Women, Triuchengode, IN
2 Department of Computer Science, Sri Sarada College for Women, Salem, IN
Source
Wireless Communication, Vol 4, No 5 (2012), Pagination: 237-243Abstract
Mobile node is a collection of mobile nodes which forms a temporary network. Some of the nodes in an ad hoc network may want access to an external network, such as internet. Different mechanisms have been proposed to integrate MANETs and the Internet[10][11]. These mechanisms are differing based on gateway discovery mechanism, and Adhoc routing protocol[13][16]. When MANET is connected to the Internet, it is important for the mobile nodes to detect an available gateway providing an access to the Internet. The objective of this paper is based on Mobile Ad-hoc Network (MANET) routing protocols used in gateways. AODV[1] is one of the most popular routing protocols for ad-hoc networks; it uses the flooding technique for locating the destinations, and gateway, possibly cause an overhead in the network. To overcome this problem we have introduced the MPR (Multi Point Relay) algorithm [2][9] in the AODV protocol in order to reduce the number of messages broadcasted during the flooding phase and also the MPRAODV protocol uses the hybrid approach to find out the gateway[14][15]. The extended AODV (MPRAODV) using MPR reduces the overhead and enhances the packet delivery performance.Keywords
MANET, AODV, MPR, Gateway, Adhoc Internet Connectivity.- Cluster Based Key Management & Authentication Technique for Wireless Sensor Networks
Abstract Views :144 |
PDF Views:3
Authors
T. Lalitha
1,
R. Umarani
1
Affiliations
1 Bharathiar University, Coimbatore, Tamilnadu, IN
1 Bharathiar University, Coimbatore, Tamilnadu, IN
Source
Wireless Communication, Vol 4, No 2 (2012), Pagination: 74-78Abstract
In wireless sensor networks, the security attacks are due to the compromise of the large part of the network which can cause node damage or disturbance in the data flow. At the time of re-keying process, if the re-key from the sink is not securely transmitted to the compromised node, it will lead to denial of service attack. In this paper, we propose a cluster based key management technique for authentication in wireless sensor networks. Initially, clusters are formed in the network and the cluster heads are selected based on the energy cost, coverage and processing capacity. The sink assigns cluster key to every cluster and an EBS key set to every cluster head. The EBS key set contains the pairwise keys for intra-cluster and inter-cluster communication. The cluster head upon detecting a compromised node in its cluster sends a request to sink to perform re-keying operation. The re-keying process utilizes the hashing function for authentication and nodes are recovered in a secured manner.- An Enriched Reactive Routing Protocol-AODV for Mobile Ad hoc Networks
Abstract Views :192 |
PDF Views:3
Authors
K. Vanaja
1,
R. Umarani
2
Affiliations
1 Vivekanandha College of Arts and Sciences for Women, Tiruchengode, Tamil Nadu, IN
2 Sri Sarada College for Women, Salem, Tamil Nadu, IN
1 Vivekanandha College of Arts and Sciences for Women, Tiruchengode, Tamil Nadu, IN
2 Sri Sarada College for Women, Salem, Tamil Nadu, IN